hash
stringlengths 32
32
| doc_id
stringlengths 7
13
| section
stringlengths 3
121
| content
stringlengths 0
3.82M
|
---|---|---|---|
4968c07ddf31b0134f1264dc69e760bd
|
119 511
|
8.2 Notification protocol
|
OVR-8.2-01: The preservation service may define a notification protocol in order to be able to send messages or information to its subscribers. NOTE: The way how this notification is done is out of the scope of this policy. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 30 OVR-8.2-02 [CONDITONAL]: When the preservation service provides a notification protocol, in case a preservation evidence policy referenced in an active preservation profile is considered to become insecure, the preservation service shall notify its subscribers possibly using the corresponding profile about the security concerns that are specific for that preservation evidence policy. OVR-8.2-03 [CONDITONAL]: When the preservation service provides a notification protocol, in case there are changes in references elements that have an influence on the specific profile, the PSP shall notify its subscribers possibly using this profile.
|
4968c07ddf31b0134f1264dc69e760bd
|
119 511
|
9 Preservation process
| |
4968c07ddf31b0134f1264dc69e760bd
|
119 511
|
9.1 Storage of preserved data and evidences
|
OVR-9.1-01 [WOS] [WTS]: A preservation service without storage or with temporary storage should not store the data to be preserved after the evidence has been created. OVR-9.1-02 [WOS] [WTS][CONDITIONAL]: A preservation service without storage or with temporary storage which stores the data to be preserved after the evidence has be created should state the reasons for doing so in its terms and conditions. OVR-9.1-03 [WTS]: A preservation service with temporary storage shall not store the evidence for a time period longer than the time indicated in the preservation practice statement.
|
4968c07ddf31b0134f1264dc69e760bd
|
119 511
|
9.2 Preservation evidences
|
OVR-9.2-01 [CONDITIONAL]: If the preservation service uses a time-stamp token it shall conform to IETF RFC 3161 [i.18] and updated by IETF RFC 5816 [i.22]. OVR-9.2-02 [CONDITIONAL]: If the preservation service uses a time-stamp token it should conform to the time- stamping protocol and time-stamp token profiles as defined ETSI EN 319 422 [i.12]. OVR-9.2-03 [CONDITIONAL]: If the preservation service uses an evidence record it shall conform to IETF RFC 4998 [i.20] or IETF RFC 6283 [i.23]. OVR-9.2-04 [CONDITIONAL]: If the preservation evidence policy cannot be identified from the context, the preservation evidence policy should be included directly in the preservation evidence. NOTE: The preservation evidence policy is referenced by the preservation profile. If the preservation profile is known from the context, the evidence policy is known as well. OVR-9.2-05 [CONDITIONAL]: If the preservation evidence policy is included in the preservation evidence, it should be cryptographically protected.
|
4968c07ddf31b0134f1264dc69e760bd
|
119 511
|
9.3 Preservation of digital signatures
|
OVR-9.3-01 [PDS][PDS+PGD] [CONDITIONAL]: If the validation data is not submitted by the preservation client, the preservation service shall make its best efforts to collect and verify the validation data according to the signature validation policy supported by the preservation profile (see clause 6.6). OVR-9.3-02 [PDS][PDS+PGD] [CONDITIONAL]: If the validation data is submitted by the preservation client, the preservation service should verify the submitted validation data according to the signature validation policy supported by the preservation profile (see clause 6.6), and verify that the submitted validation data is appropriate, otherwise it should collect and verify the appropriate validation data. OVR-9.3-03 [PDS]: To extend the ability to validate a digital signature and to maintain its validity status, the preservation service shall, at the minimum, provide a proof of existence of the signature and of the validation data needed to validate the signature using digital signature techniques (digital signatures, time-stamps, evidence records). ETSI ETSI TS 119 511 V1.1.1 (2019-06) 31 NOTE 1: A proof of existence of a detached signature provides also a proof of existence of the signed data at as long algorithms, e.g. the hash function used in the original signature is resistant against collision attacks. OVR-9.3-04 [PDS+PGD]: To extend the ability to validate a digital signature and to maintain its validity status, the preservation service shall, on one side, provide a proof of existence of the signature and of the validation data needed to validate the signature and on the other side a proof of existence of the signed data. NOTE 2: The present document gives no restrictions on the way the preservation service obtains the validation data needed to validate the signature. EXAMPLE: The preservation service can use an internal or external validation service to obtain the needed validation data, or just apply an appropriate time-stamp and perform an X.509 validation of the signer's certification path. OVR-9.3-05 [PDS][PDS+PGD] [CONDITIONAL]: In the case of a detached signature, the preservation service may allow the preservation subscriber to provide only a hash value of the signed data instead of the signed data itself. OVR-9.3-06 [PDS][PDS+PGD] [CONDITIONAL]: In case of a detached signature and if the preservation service allows the preservation subscriber to provide only a hash value of the signed data, the PSP shall indicate in the preservation profile the identifiers of the hash functions that can be used. OVR-9.3-07 [PDS][PDS+PGD] [CONDITIONAL]: In case of a detached signature and if the preservation service allows the preservation subscriber to provide only a hash value of the signed data, the preservation service shall treat the hash value (associated with a hash function identifier) as a general data linked somehow to the signature, since it has no way of knowing if the hash value really corresponds to the signed data. NOTE 3: In this case, the preservation service is only responsible for the preservation of the submitted hash value (associated with a hash function identifier). OVR-9.3-08 [PDS][PDS+PGD] [CONDITIONAL]: In case of a detached signature and if the preservation service allows the preservation subscriber to provide only a hash value of the signed data, the preservation service shall verify that the submitted preservation object contains hash function identifiers that are in accordance with the identifiers of the hash functions listed in the preservation profile and that each hash value has a length in accordance with the associated hash function identifier. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 32 Annex A (normative): Qualified preservation service for QES as defined by article 34 the Regulation (EU) No 910/2014 NOTE 1: This clause aims at providing requirements for a preservation service allowing it to fulfil the requirement of Regulation (EU) No 910/2014 [i.2] for qualified preservation service for qualified electronic signature and or seals (QES). NOTE 2: A qualified preservation service is only mentioned for the preservation of QES, not for the preservation of general data. However, nothing forbids such a service to preserve also other data. OVR-A-01 [PDS] [PDS+PGD]: All requirements from clause 5 to 9 shall apply. In addition: OVR-A-02 [PDS][PDS+PGD]: The preservation service shall preserve all information needed to check the qualification status of the electronic signature or seal that would not be publicly available until the end of the preservation period. NOTE 3: As long as the corresponding EU Member State (EUMS) trusted list is provided, the information of historical services is included and publicly available. NOTE 4: CID (EU) 2015/1505 [i.3] defines the technical specifications and formats relating to EUMS trusted lists pursuant to Article 22(5) of Regulation (EU) No 910/2014 [i.2]. OVR-A-03 [PDS][PDS+PGD]: Time-stamps used within the preservation evidence should be provided by a qualified TSA. OVR-A-04: The preservation service shall have one service digital identifier as defined in clause 5.5.3 of ETSI TS 119 612 [2] which allows to uniquely and unambiguously identify the service within an EUMS trusted list. EXAMPLE 1: The PKI certificate corresponding to an electronic seal that is applied to a receipt returned to the client after submitting data to the preservation service. EXAMPLE 2: The PKI certificate corresponding to an SSL certificate used when connecting to the preservation service. EXAMPLE 3: The certificate of a TSA service uniquely used by the preservation service. EXAMPLE 4: In case no PKI public key technology is used to identify the preservation service, an indicator expressed by a URI which uniquely and unambiguously identifies the preservation service. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 33 Annex B (informative): Mapping of requirements to Regulation (EU) No 910/2014 The qualified preservation of QES is specified by Article 34.1 of the Regulation (EU) No 910/2014 [i.2] as follows: "A qualified preservation service for qualified electronic signatures may only be provided by a qualified trust service provider that uses procedures and technologies capable of extending the trustworthiness of the qualified electronic signature beyond the technological validity period." For the qualified preservation of qualified electronic seals, the Regulation (EU) No 910/2014 Article 40 [i.2] is applicable. Article 40 states that Article 4 "shall apply mutatis mutandis to the … preservation of qualified electronic seals". Unless stated specifically, in the rest of the present annex QES will mean indifferently qualified electronic seal or qualified electronic signature. Qualified trust service provider The requirements for qualified trust service providers are provided in Article 24.2 (a) to (j) of Regulation (EU) No 910/2014 [i.2]. They are covered by the present document as follows. Article 24.2 of Regulation (EU) No 910/2014 [i.2] Requirements from the present document (a) inform the supervisory body of any change in the provision of its qualified trust services and an intention to cease those activities; (this is not specified by technical standards) (b) employ staff and, if applicable, subcontractors who possess the necessary expertise, reliability, experience, and qualifications and who have received appropriate training regarding security and personal data protection rules and shall apply administrative and management procedures which correspond to European or international standards; Clause 7.2 OVR-9.1-01 OVR-9.1-02 (c) with regard to the risk of liability for damages in accordance with Article 13, maintain sufficient financial resources and/or obtain appropriate liability insurance, in accordance with national law; Clause 7.1 (d) before entering into a contractual relationship, inform, in a clear and comprehensive manner, any person seeking to use a qualified trust service of the precise terms and conditions regarding the use of that service, including any limitations on its use; Clause 6.2 (e) use trustworthy systems and products that are protected against modification and ensure the technical security and reliability of the processes supported by them; Clause 7.7 PRP-8.1-01 and PRP-8.1-03 (f) use trustworthy systems to store data provided to it, in a verifiable form so that: (i) they are publicly available for retrieval only where the consent of the person to whom the data relates has been obtained; (ii) only authorized persons can make entries and changes to the stored data; (iii) the data can be checked for authenticity; Clause 7.13 Clause 7.2 Clause 7.5 (g) take appropriate measures against forgery and theft of data; Clauses 7.6 and 7.7 (h) record and keep accessible for an appropriate period of time, including after the activities of the qualified trust service provider have ceased, all relevant information concerning data issued and received by the qualified trust service provider, in particular, for the purpose of providing evidence in legal proceedings and for the purpose of ensuring continuity of the service. Such recording may be done electronically; Clauses 7.10 and 7.11 (i) have an up-to-date termination plan to ensure continuity of service in accordance with provisions verified by the supervisory body under point (i) of Article 17(4); Clause 7.12 (j) ensure lawful processing of personal data in accordance with Directive 95/46/EC [i.1]. Clause 7.13 ETSI ETSI TS 119 511 V1.1.1 (2019-06) 34 A qualified trust service is referenced in the trusted list: Article 22.1 of Regulation (EU) No 910/2014 [i.2] Requirements from the present document Each Member State shall establish, maintain and publish trusted lists, including information related to the qualified trust service providers for which it is responsible, together with information related to the qualified trust services provided by them. OVR-A-04 Providing preservation in compliance with Article 34(1) (respectively 40) The additional requirements for qualified preservation of QES are covered by the present document as follows. Article 34.1 of Regulation (EU) No 910/2014 [i.2] Requirements from the present document Uses procedures and technologies capable of extending the trustworthiness of the qualified electronic signature beyond the technological validity period. Clause 7.14 Clause 7.15 Clause 9.2 Clause 9.3 OVR-A-02 ETSI ETSI TS 119 511 V1.1.1 (2019-06) 35 Annex C (informative): Differences and relationships between an archival service and a preservation service C.1 Archival services When managing records within an archival service there are three different stages for the life cycle: 1) Current records: In this phase the records are created updated and/or linked together. During this phase, a workflow application is often used to manage the records. 2) Semi-current or intermediary records: Once records become stable, i.e. they are not changed anymore, they can be transferred to an archival system. Metadata is included into the records for two main reasons: a) to be able to identify the records that correspond to some search criteria so that they can be retrieved; and b) to be able to identify the records that have reached their disposal phase where the records can either be deleted, transferred to an historical archiving system and kept longer. 3) Historical records: Such records are selected for a permanent archival usually based on grounds of their cultural, historical, or evidentiary value. In this case, the time period of archival is "forever". The metadata included into the records is used to find out one or more records which correspond to some search criteria for the purpose of accessing to these records. When a record is presented to an intermediary archival service, the archival service adds metadata to the record so that the date of the archival can be known, as well as an identifier of the entity which made the deposit. EXAMPLE: In France, an archival system may use cryptographic techniques to provide proofs of existence of the data, but it is not mandatory to do so. In such a case, it may use the services of a preservation service as described in the present document. C.2 Preservation services There are three main categories of Preservation Services: 1) with storage; 2) without storage; or 3) with temporary storage. A Preservation Service with storage may look similar to an Archival Service because both services support a storage functionality. A Preservation Service with storage keeps the submitted preservation objects and the associated evidences into storage during a preservation period. The preservation service provides the functionality to delete the preservation objects before the end of the preservation period. EXAMPLE: In Germany, before deleting a PO, all federal and state public bodies are legally required to offer documents that are no longer needed for carrying out tasks to the Federal or State Archive to be taken over as federal/state archive material. This duty to offer also applies to electronic documents. Because archiving is not the subject of this technical specification, however, the corresponding legal requirements will not be described in more detail. Preservation services as described in the present document use digital signature techniques. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 36 There are two possible preservation goals: 1) extending over long periods of time the ability to validate a digital signature and to maintain its validity status; and 2) providing proofs of existence of data over long periods of time. To be able to extend over long periods of time the validity status of a digital signature the preservation service needs to provide a proof of existence of: 1) the signature; 2) the signed data; and 3) the validation data (certificate paths, revocation information). NOTE: The proof of existence of the signed data can be indirectly done by a proof of existence of the signature, as long as the signature can still be trusted to provide proof of integrity of the signed data, i.e. the hash algorithm and the cryptographic algorithm used to create the signature can still be trusted. C.3 Comparison of archival services with preservation services For a digital archival service, the demonstration of a proof of existence can be based on an audit of the archival service against some criteria, e.g. ISO 14721:2012 [i.16], ISO 16363 [i.17], ISO 14641-1:2018 [i.15] or other similar norms. For a preservation service as defined in the present document, the demonstration of a proof of existence will be based on two factors: 1) an audit of the Preservation service against some criteria, e.g. the present document; and 2) the use of digital signature techniques to demonstrate that some data has not been modified since a given date. A digital archival service may use digital signature techniques to provide proofs of existence for some data but is not required to use them. A preservation service can be part of an archival service. A difference between a preservation service and an archival service is that an archival service without a preservation service does not capture nor verify any validation data associated with a digital signature. C.4 Relationships between archival services and preservation services A digital archival service can use a preservation service to provide proofs of existence of data based on digital signature techniques. It needs to manage all the metadata required by an archival service. A preservation service with storage (WST) can use an archival service for the goal of storing data. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 37 Annex D (informative): Cryptographic threats and countermeasures D.1 Risks based on collision attacks of one-way hash functions used within a digital signature A digital signature, used in connection with a time assertion, uses a one-way collision resistant hash function used to compute a hash value which is signed by the signer's private key. In such a way, the digital signature protects the integrity of the hash value. Such one-way collision resistant hash functions can become weak on the long term. In this case, it might then be possible to find another signed data that would lead to the same hash value, and the integrity of the signed data cannot be guaranteed anymore. This principle applies to digital signatures submitted by the user, but also for any digital signature/time-stamp created by external trust service providers or the preservation service itself which are included by the preservation service within a preservation evidence. There are various strategies to address the case where the one-way collision resistant hash function becomes weak which was originally used to compute the hash value signed under the signer's private key. In case the preservation service has access to the signed data it can compute a new digital signature or time assertion based on a new hash value of the signed data, calculated with a suitable hash algorithm and suitable parameters, to guarantee the integrity and proof of existence of the signed data before the original hash algorithm becomes weak. In case the preservation submitter only submitted the hash of the digitally signed data to the preservation service, e.g. because it is very large or due to privacy reasons, the preservation service cannot recompute on its own a new hash of the signed data. The client may submit two hash values computed by two different hash algorithms, based on different mathematical principles, to reduce the risk of possible collision attacks. In any case, the preservation service cannot know if the hash value(s) corresponds to the signed data, and can treat them only as arbitrary data related to the signature. In the general case it is much more difficult, but not impossible, to find a collision for two such algorithms. NOTE 1: ETSI TS 119 312 [i.5] gives recommendations on suitable hash algorithms. NOTE 2: In case the preservation submitter only submitted the hash of the signed data, proof of existence of the signed data falls out of the control and responsibility of the Preservation Service. The preservation client is responsible for the creation of the submitted digests and the preservation of the signed data. D.2 Risks based on the digital signature algorithm and key length A digital signature uses an asymmetric signature algorithm based on a key pair of a specific key length. Due to development in cryptography it might be possible that at some moment in time it cannot be guaranteed anymore that the private key by which a specific signature was created, is still private and secret. This problem can be avoided if the digital signature including the certificate is covered by a time assertion that proves that it already existed before a specific time from which such an attack became possible. However, some time assertions rely upon mechanisms that will be subject to the same problems. To counter this problem, time assertions are protected by obtaining a new time-stamp that covers the original data, its time-stamps and the corresponding validation data prior to the compromise of mechanisms used to generate the time assertions. This principle applies to digital signatures submitted by the preservation submitter, but also for any digital signature/time assertions which are included within a preservation evidence. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 38 D.3 Risks based on the revocation of a signing key The revocation of a certificate states that the usage of the private key cannot be trusted anymore, e.g. because the (access to) the private key was stolen. To be able to trust that a digital signature was created by the signer, the certificate needs to be checked that it was not revoked at the moment of signing or before. This can be done by using revocation information, like CRLs or OCSP responses, of the certificate. The preservation service captures and protects revocation information in the preservation evidence, using a proof of existence over it, to avoid problems because revocation information is not available anymore. NOTE 1: To prove that a certificate was not revoked at a certain time, a proof of existence of the signature is needed in addition to the revocation information. This principle applies to digital signatures submitted by the preservation submitter as well as to any digital signature/time-stamp created by external trust service providers or the preservation service itself and which are included by the preservation service within a preservation evidence. In the general case, revocation information is available as long as a certificate is not expired. However, a CA can also provide it after the expiration date of the certificate. NOTE 2: In case of qualified certificates in the context of Regulation (EU) No 910/2014 [i.2] revocation information is provided beyond the validity period of the certificates. ETSI ETSI TS 119 511 V1.1.1 (2019-06) 39 History Document history V1.1.1 June 2019 Publication
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
1 Scope
|
The present document describes the root Uniform Resource Identifier (URI) http://uri.etsi.org/ades and sub branches that allow to define URI applicable for more than one AdES signature format and/or the ASiC signature container. The present document describes how to define URIs to reference a specific version and/specific attribute/property of an AdES format. NOTE: The present document defines URIs which are not used as pointers to a specific location but are used as unique identifiers.
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
2 References
| |
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI TS 103 171: "Electronic Signatures and Infrastructures (ESI); XAdES Baseline Profile". [2] ETSI TS 103 172: "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile". [3] ETSI TS 103 173: "Electronic Signatures and Infrastructures (ESI); CAdES Baseline Profile". [4] ETSI TS 103 174: "Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile". [5] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures". [6] ETSI EN 319 122-2: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 2: Extended CAdES signatures". [7] ETSI TS 119 122-3: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 3: Incorporation of Evidence Record Syntax (ERS) mechanisms in CAdES". [8] ETSI EN 319 132-1: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures". [9] ETSI EN 319 132-2: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 2: Extended XAdES signatures". [10] ETSI TS 119 132-3: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 3: Incorporation of Evidence Record Syntax (ERS) mechanisms in XAdES". [11] ETSI EN 319 142-1: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures". [12] ETSI EN 319 142-2: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 2: Additional PAdES signatures profiles". [13] ETSI EN 319 162-1: "Electronic Signatures and Infrastructures (ESI); Associated Signature Containers (ASiC); Part 1: Building blocks and ASiC baseline containers". ETSI ETSI TS 119 192 V1.2.1 (2023-02) 6 [14] Void. [15] ETSI TS 119 182-1: "Electronic Signatures and Infrastructures (ESI); JAdES digital signatures; Part 1: Building blocks and JAdES baseline signatures".
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI TR 119 000: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures: overview". [i.2] Commission Implementing Decision (EU) 2015/1506 of 8 September 2015 laying down specifications relating to formats of advanced electronic signatures and advanced seals to be recognised by public sector bodies pursuant to Articles 27(5) and 37(5) of Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market (Text with EEA relevance). [i.3] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations".
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
3 Definition of terms, symbols and abbreviations
| |
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
3.1 Terms
|
For the purposes of the present document, the terms given in ETSI TR 119 001 [i.3] and the following apply: AdES (digital) signature: digital signature that is either a CAdES signature, a PAdES signature, a XAdES signature, or a JAdES signature JAdES signature: JSON Web Signature NOTE: As defined in ETSI TS 119 182-1 [15]. signature class: set of signatures achieving a given functionality signature level: format specific definition of a set of data incorporated into a digital signature, which allows to implement a signature class
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
3.2 Symbols
|
Void.
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
3.3 Abbreviations
|
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.3] and the following apply: CID Commission Implementation Decision URI Uniform Resource Identifier ETSI ETSI TS 119 192 V1.2.1 (2023-02) 7
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
4 URI namespaces
| |
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
4.1 The main branch
|
Any URI under the root http://uri.etsi.org/ades shall be used to describe URIs applicable for all types of AdES signatures.
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
4.2 URIs used to describe signature levels
|
4.2.1 Baseline signature and container levels as defined in the standardization framework for signatures ETSI TR 119 000 A URI describing a baseline signature level which is defined in ETSI EN 319 122-1 [5] (CAdES), ETSI EN 319 132-1 [8] (XAdES) and ETSI EN 319 142-1 [11] (PAdES) or a baseline container level which is defined in ETSI EN 319 162-1 [13] (ASiC) shall be built in the following way: http://uri.etsi.org/ades/191x2/level/baseline/<name-of-the-baselinelevel># where: • 191x2: states that the level is defined in all the signature format documents with a number x19 1x2: - level: states that this URI defines a signature level: baseline: states that this URI defines a baseline signature level. The following URIs are defined: • http://uri.etsi.org/ades/191x2/level/baseline/B-B# shall denote a B-B level as defined in ETSI EN 319 122-1 [5] (CAdES), ETSI EN 319 132-1 [8] (XAdES), ETSI EN 319 142-1 [11] (PAdES), ETSI EN 319 162-1 [13] (ASiC) or ETSI TS 119 182-1 [15] (JAdES); • http://uri.etsi.org/ades/191x2/level/baseline/B-T# shall denote a B-T level as defined in ETSI EN 319 122-1 [5] (CAdES), ETSI EN 319 132-1 [8] (XAdES), ETSI EN 319 142-1 [11] (PAdES), ETSI EN 319 162-1 [13] (ASiC) or ETSI TS 119 182-1 [15] (JAdES); • http://uri.etsi.org/ades/191x2/level/baseline/B-LT# shall denote a B-LT level as defined in ETSI EN 319 122-1 [5] (CAdES), ETSI EN 319 132-1 [8] (XAdES), ETSI EN 319 142-1 [11] (PAdES), ETSI EN 319 162-1 [13] (ASiC) or ETSI TS 119 182-1 [15] (JAdES); • http://uri.etsi.org/ades/191x2/level/baseline/B-LTA# shall denote a B-LTA level as defined in ETSI EN 319 122-1 [5] (CAdES), ETSI EN 319 132-1 [8] (XAdES), ETSI EN 319 142-1 [11] (PAdES), ETSI EN 319 162-1 [13] (ASiC) or ETSI TS 119 182-1 [15] (JAdES). NOTE: For the specification of ASiC levels see ETSI EN 319 162-1 [13], clause 5.1. 4.2.2 Baseline signature and container levels as defined in the CID 2015/1506 A URI describing a baseline signature level which is defined in ETSI TS 103 171 [1] (XAdES), ETSI TS 103 172 [2] (PAdES) and ETSI TS 103 173 [3] (CAdES) or a baseline container level which is defined in ETSI TS 103 174 [4] (ASiC) as referenced in the CID 2015/1506 [i.2]) shall be built in the following way: http://uri.etsi.org/ades/etsits/level/baseline/<name-of-the-baselinelevel># ETSI ETSI TS 119 192 V1.2.1 (2023-02) 8 where: • etsits: states that the level is defined in all the signature format documents with a number x19 1x2: - level: states that this URI defines a signature level: baseline: states that this URI define a baseline signature level. The following URIs are defined: • http://uri.etsi.org/ades/etsits/level/baseline/B-B# shall denote a B level as defined in ETSI TS 103 171 [1] (XAdES), ETSI TS 103 172 [2] (PAdES), ETSI TS 103 173 [3] (CAdES) or ETSI TS 103 174 [4] (ASiC); • http://uri.etsi.org/ades/etsits/level/baseline/B-T# shall denote a T level as defined in ETSI TS 103 171 [1] (XAdES), ETSI TS 103 172 [2] (PAdES), ETSI TS 103 173 [3] (CAdES) or ETSI TS 103 174 [4] (ASiC); • http://uri.etsi.org/ades/etsits/level/baseline/B-LT# shall denote an LT level as defined in ETSI TS 103 171 [1] (XAdES), ETSI TS 103 172 [2] (PAdES), ETSI TS 103 173 [3] (CAdES) or ETSI TS 103 174 [4] (ASiC); • http://uri.etsi.org/ades/etsits/level/baseline/B-LTA# shall denote an LTA level as defined in ETSI TS 103 171 [1] (XAdES), ETSI TS 103 172 [2] (PAdES) or ETSI TS 103 173 [3] (CAdES). NOTE 1: For the specification of ASiC levels see ETSI TS 103 174 [4], clause 4. NOTE 2: No LTA level for ASiC is defined in ETSI TS 103 174 [4]. 4.2.3 Extended signature levels as defined in the standardization framework for signatures ETSI TR 119 000 A URI describing an extended signature level which is defined in more than one of the documents ETSI EN 319 122-2 [6] (CAdES), ETSI EN 319 132-2 [9] (XAdES) or ETSI EN 319 142-2 [12] (PAdES) shall be built in the following way: http://uri.etsi.org/ades/191x2/level/extended/<name-of-the-extendedlevel># where: • 191x2: states that the level is defined in more than one of the signature format documents with a number x19 1x2: - level: states that this URI defines a signature level: extended: states that this URI define an extended signature level. The following URIs are defined: • http://uri.etsi.org/ades/191x2/level/extended/E-BES# shall denote an E-BES level as defined in ETSI EN 319 122-2 [6] (CAdES), ETSI EN 319 132-2 [9] (XAdES) or ETSI EN 319 142-2 [12] (PAdES); • http://uri.etsi.org/ades/191x2etsits/level/extended/E-EPES# shall denote an E-EPES level as defined in ETSI EN 319 122-2 [6] (CAdES), ETSI EN 319 132-2 [9] (XAdES) or ETSI EN 319 142-2 [12] (PAdES); • http://uri.etsi.org/ades/191x2/level/extended/E-T# shall denote an E-T level as defined in ETSI EN 319 122-2 [6] (CAdES) or ETSI EN 319 132-2 [9] (XAdES); • http://uri.etsi.org/ades/191x2/level/extended/E-A# shall denote an E-A level as defined in ETSI EN 319 122-2 [6] (CAdES) or ETSI EN 319 132-2 [9] (XAdES); • http://uri.etsi.org/ades/191x2/level/extended/E-ERS# shall denote an E-ERS level as defined in ETSI TS 119 122-3 [7] (CAdES) or ETSI TS 119 132-3 [10] (XAdES). ETSI ETSI TS 119 192 V1.2.1 (2023-02) 9
|
1f0eea917a618045ce22f119edbd92bc
|
119 192
|
4.3 How to reference specific signature format version
|
To reference a specific version of a signature format or an ASiC container the URI shall have the following structure: http://uri.etsi.org/<number_of_the_document >/<specific_version> The number_of_the_document shall be the five-digit number obtained by removing the first digit of the ETSI document number, and any part or sub-part numbers. The specific version shall be of format vx.y.z where x.y.z are the three digits used to identify an ETSI document version. EXAMPLE: Version V1.1.1 of ETSI EN 319 122-1 [5] is referenced as http//www.etsi.org/19122/v1.1.1. 4.4 How to reference specific attribute/properties in an AdES signature To reference a specific attribute/property of a signature format or of an ASiC container, the URI shall have the following structure: http://uri.etsi.org/<number_of_the_document>/<specific_version> <name_of_the_attribute_or_property> The number_of_the_document and specific_version shall be as defined in clause 4.3. The name_of_the_attribute_or_property shall be the name of the attribute or property as used within the specific ETSI document. EXAMPLE: The signature-time-stamp as defined in ETSI EN 319 122-1 [5] is referenced as http://uri.etsi.org/19122/v1.1.1/signature-time-stamp. NOTE 1: A signature attribute or property is always specified together with the version of the ETSI document in which it is defined. NOTE 2: In case the URI references as attribute a signature included in an ASiC container, a specific attribute/property of a signature format can be referenced as specified in the present clause. ETSI ETSI TS 119 192 V1.2.1 (2023-02) 10 Annex A (informative): Change History Date Version Information about changes January 2023 1.1.2 Implementation of: • CR: include JAdES to the corresponding URIs January 2023 1.1.3 Add "-1" to the references of ETSI TS 119 182 January 2023 1.1.4 Remove unnecessary ";" ETSI ETSI TS 119 192 V1.2.1 (2023-02) 11 History Document history V1.1.1 May 2021 Publication V1.2.1 February 2023 Publication
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
1 Scope
|
The present document: 1) Specifies a JSON [1] format for AdES signatures (JAdES signatures hereinafter) built on JSON Web Signatures (JWS hereinafter) as specified in IETF RFC 7515 [2]. For this, the present document: - Extends the JSON Web Signatures specified in IETF RFC 7515 [2] by defining an additional set of JSON header parameters that can be incorporated in the JOSE Header (either in its JWS Protected Header or its JWS Unprotected Header parts). Many of these new header parameters have the same semantics as the attributes/properties defined in CAdES [i.2] and XAdES [4] digital signatures. Other header parameters are defined to meet specific requirements that current JSON Web Signatures cannot meet (e.g. for explicitly referencing detached JWS Payload). These new header parameters and their corresponding types are defined in a JSON schema. - Specifies the mechanisms for incorporating the aforementioned JSON components in JSON Web Signatures [2] to build JAdES signatures, offering the same features as CAdES and XAdES in JSON syntax, and therefore fulfilling the same requirements (such as the long-term validity of digital signatures). 2) Defines four levels of JAdES baseline signatures addressing incremental requirements to maintain the validity of the signatures over the long term. Each level requires the presence of certain JAdES header parameters, suitably profiled for reducing the optionality as much as possible. The aforementioned levels provide the basic features necessary for a wide range of business and governmental use cases for electronic procedures and communications to be applicable to a wide range of communities when there is a clear need for interoperability of digital signatures used in electronic documents. EXAMPLE: An example of requirements raised in specific domains is signing HTTP messages exchanged by parties in certain environments, which require signing both the HTTP body and some specific http headers. The format specified in IETF RFC 7515 [2] does not provide any native mechanism for individually identifying a detached JWS Payload. Clause 5.2.8 of the present document defines sigD, a new JSON header parameter that allows to identify one or more detached data objects which, suitably processed and concatenated, form the detached JWS Payload. Procedures for creation, augmentation, and validation of JAdES digital signatures are out of scope. NOTE 1: ETSI EN 319 102-1 [i.3] specifies procedures for creation, augmentation and validation of other types of AdES digital signatures. The present multi-part deliverable aims at supporting electronic signatures independent of any specific regulatory framework. NOTE 2: Specifically, but not exclusively, it is the aim that JAdES digital signatures specified in the present multi-part deliverable can be used to meet the requirements of electronic signatures, advanced electronic signatures, qualified electronic signatures, electronic seals, advanced electronic seals, and qualified electronic seals as defined in Regulation (EU) No 910/2014 [i.1].
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
2 References
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https://docbox.etsi.org/Reference/. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 8 The following referenced documents are necessary for the application of the present document. [1] IETF RFC 8259 (December 2017): "The JavaScript Object Notation (JSON) Data Interchange Format". [2] IETF RFC 7515 (May 2015): "JSON Web Signature (JWS)". [3] IETF RFC 3061 (February 2001): "A URN Namespace of Object Identifiers". [4] ETSI EN 319 132-1: "Electronic Signatures and Trust Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures". [5] IETF RFC 5035 (August 2007): "Enhanced Security Services (ESS) Update: Adding CertID Algorithm Agility". [6] Recommendation ITU-T X.509: "Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks". [7] IETF RFC 3161 (August 2001): "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)". [8] IETF RFC 5280 (May 2008): "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile". [9] IETF RFC 6960 (June 2013): "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP". [10] IETF RFC 5816 (April 2010): "ESSCertIDv2 Update for RFC 3161". [11] IETF RFC 3494 (March 2003): "Lightweight Directory Access Protocol version 2 (LDAPv2) to Historic Status". [12] IETF RFC 4648 (October 2006): "The Base16, Base32, and Base64 Data Encodings". [13] IETF RFC 3230 (January 2002): "Instance Digests in HTTP". [14] IETF RFC 7797 (February 2016): "JSON Web Signature (JWS) Unencoded Payload Option". [15] IETF RFC 3339 (July 2002): "Date and Time on the Internet: Timestamps". [16] IETF RFC 7518 (May 2015): "JSON Web Algorithms (JWA)". [17] IETF RFC 3986 (January 2005): "Uniform Resource Identifier (URI): Generic Syntax". [18] IETF RFC 2616 (June 1999): "Hypertext Transfer Protocol - HTTP/1.1". [19] draft-handrews-json-schema-01 (March 2018): "JSON Schema: A Media Type for Describing JSON Documents". [20] draft-handrews-json-schema-validation-01 (March 2018): "JSON Schema Validation: A Vocabulary for Structural Validation of JSON". [21] ETSI TS 119 312 (V1.3.1): "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". [22] IETF RFC 7519 (May 2015): "JSON Web Token (JWT)". [23] ISO 8601-1:2019: "Date and time - Representations for information interchange - Part 1: Basic rules". [24] IETF RFC 7540 (May 2015): "Hypertext Transfer Protocol Version 2 (HTTP/2)". ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 9
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. OJ L 257, 28.08.2014, p. 73-114. [i.2] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures". [i.3] ETSI EN 319 102-1: "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation". [i.4] ETSI TR 119 000: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of digital signatures and trust services; Overview". [i.5] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations". [i.6] ETSI TR 119 100: "Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for signature creation and validation". [i.7] ETSI TS 119 172-1: "Electronic Signatures and Infrastructures (ESI); Signature Policies; Part 1: Building blocks and table of contents for human readable signature policy documents". [i.8] OASIS Standard: "Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0". [i.9] ETSI TS 101 533-1: "Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 1: Requirements for Implementation and Management". [i.10] IETF RFC 4998: "Evidence Record Syntax (ERS)". [i.11] W3C Recommendation (19 November 2019): "Verifiable Credentials Data Model 1.0". [i.12] draft-cavage-http-signatures-10 (May 2018): "Signing HTTP Messages". [i.13] JSON Schema Specification in json-schema.org website. [i.14] draft-handrews-json-schema-02 (September 2019): "JSON Schema: A Media Type for Describing JSON Documents". [i.15] draft-handrews-json-schema-validation-02 (September 2019): "JSON Schema Validation: A Vocabulary for Structural Validation of JSON". [i.16] IETF RFC 7517 (May 2015): "JSON Web Key (JWK)". [i.17] ISO 3166-1: "Codes for the representation of names of countries and their subdivisions -- Part 1: Country code". [i.18] Juan Carlos Cruellas: "Bringing JSON signatures to ETSI AdES framework: meet JAdES signatures". Computer Standards and Interfaces, Volume 71, August 2020. [i.19] ETSI TS 119 182-1 (V1.1.1): "Electronic Signatures and Infrastructures (ESI); JAdES digital signatures; Part 1: Building blocks and JAdES baseline signatures", March 2021. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 10 3 Definition of terms, symbols, abbreviations and terminology
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
3.1 Terms
|
For the purposes of the present document, the terms given in ETSI TR 119 001 [i.5], IETF RFC 7515 [2] and the following apply: electronic time-stamp: data in electronic form which binds other electronic data to a particular time establishing evidence that these data existed at that time NOTE 1: In the case of IETF RFC 3161 [7] protocol, updated by IETF RFC 5816 [10], the electronic time-stamp is referring to the timeStampToken field within the TimeStampResp element (the TSA's response returned to the requesting client). NOTE 2: This definition makes JAdES signatures not to be bound to a particular format of electronic time-stamp, because header parameters adoTst, sigTst, arcTst, rfsTst, and sigRTst can contain electronic time-stamps of any format. JAdES signature: JSON Web Signature meeting the requirements specified in this or other parts of the present multi- part document NOTE: As specified in IETF RFC 7515 [2], or other parts of this multi-part deliverable. JWS Signature Value: digital signature cryptographic value calculated over a sequence of octets derived from the JWS Protected Header and data to be signed NOTE 1: IETF RFC 7515 [2] uses the term JWS Signature for this concept. The present document does not use this term, but the JWS Signature Value, for the sake of terminological coherence of other AdES specifications. NOTE 2: The present document uses the term JSON Web Signature (or its abbreviation, JWS), as defined by IETF RFC 7515 [2], i.e. for denoting the JSON data structure for representing a digitally signed message. NOTE 3: Note that a JAdES signature is a special type of JSON Web Signature (or JWS). Therefore these terms are not directly interchangeable as, indeed a JAdES signature IS ALSO A JSON Web Signature, but NOT ALL the JSON Web Signatures are JAdES signatures.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
3.2 Symbols
|
Void.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
3.3 Abbreviations
|
For the purposes of the present document, the following abbreviations apply: ASCII American Standard Code for Information Interchange ASN.1 Abstract Syntax Notation 1 CA Certification Authority CRL Certificate Revocation List FIPS Federal Information Processing Standards HTTP Hyper Text Transfer Protocol IETF Internet Engineering Task Force ISO International Organization for Standardization ITU-T International Telecommunication Union Telecommunication Standardization Sector JOSE JSON Object Signing and Encryption JSON JavaScript Object Notation JWS JSON Web Signature OCSP Online Certificate Status Protocol ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 11 OID Object IDentifier PKI Public Key Infrastructure RFC Request For Comments SAML Security Assertion Markup Language SHA Secure Hash Algorithm SIM Subscriber Identification Module SPO Service Provision Option URI Uniform Resource Identifier URL Uniform Resource Locator URN Uniform Resource Name UTC Coordinated Universal Time
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
3.4 Terminology
|
The present document adopts, wherever it is possible the same terminology as the terminology used in IETF RFC 7515 [2] and in IETF RFC 8259 [1]. Therefore, within the present document, the term "JSON Web Signature" shall denote the JSON structure specified in IETF RFC 7515 [2]. The present document uses the term "JSON value" for denoting JSON objects, or JSON arrays, or JSON numbers, or JSON strings, i.e. a subset of the potential meanings of "JSON value" listed in clause 3 of IETF RFC 8259 [1]. The present document uses the term "header parameter" for denoting a JSON object, JSON array, JSON number, or JSON string, which is member either of the JWS Protected Header or the JWS Unprotected Header specified in IETF RFC 8259 [1]. The present document uses the term "member" for denoting a JSON object's member, as specified in clause 4 of IETF RFC 8259 [1]. The present document uses the term "element" or "element of the array" for denoting the contents of a position within a JSON array (specified in clause 5 of IETF RFC 8259 [1]). NOTE: These last terms will be used for denoting each of the JSON values that will be added to the etsiU JSON array (specified in clause 5.3.1 of the present document), which will be incorporated in the JWS Unprotected header as a header parameter. Therefore, these JSON values will play, within the present document, an equivalent role to the role played by the unsigned attributes in CAdES and the unsigned qualifying properties in XAdES. The present document uses the term "JAdES component" or "component" for denoting any JAdES signature constituent, regardless it is a header parameter, a member of a JSON Object, an element of a JSON array, or any other JSON Value. The present document uses this special font for denoting tags of JAdES components. As for the names of the header parameters and elements of the etsiU JSON array, the following criteria and conventions have been used: 1) The names have been selected to have a maxim length of 8 characters; most of the names are shorter. 2) The names of header parameters qualifying the signature itself use to start with "sig". 3) The names of header parameters qualifying the signer use to start with "sr". 4) The names of header parameters qualifying the data to be signed use to start with "sd". 5) The names of header parameters dealing with electronic time-stamps use to finalize with "tst". 6) The names of header parameters dealing with certificates use to start or contain "x" (following the convention of IETF RFC 7515 [2], which defines the header parameters x5u, x5c, x5t, and x5t#S256). 7) The names of header parameters dealing with revocation values (CRLs or OCSP responses) use to start or contain "r". ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 12 8) The names of header parameters dealing with attribute certificates or the corresponding revocation values use to start "a". 9) The names of header parameters dealing with values (of certificates or revocation values) use to contain "Vals". 10) The names of header parameters dealing with references (to certificates or revocation values) use to contain "Refs" (except x5t, and x5t#S256, which have been defined in IETF RFC 7515 [2], contain references to certificates, and do not include it).
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
4 General Requirements
|
The JAdES components defined in the present document shall be carried within the JOSE header as specified in IETF RFC 7515 [2]. All the JAdES signed header parameters specified in clause 5.2 of the present document, as well as the header parameters specified elsewhere and further profiled in clause 5.1 of the present document, if required to be present, shall be incorporated as header parameters of the JWS Protected Header of the JSON Web Signature, specified in IETF RFC 7515 [2]. JAdES signatures may be serialized using either JWS Compact Serialization or JWS JSON Serialization as specified in clause 3 of IETF RFC 7515 [2]. JWS Unprotected Header in JAdES signatures shall contain only one header parameter, namely the etsiU header parameter (specified in clause 5.3 of the present document), which is defined as a JSON array. As in JWS, if a JAdES signature contains the JWS Unprotected Header, then the JAdES signature can only be serialized using JWS JSON Serialization. NOTE 1: The rationale for this is that the JWS Unprotected Header is a JSON object, and no order may be inferred in its different members. This is the reason why the present document defines etsiU header parameter as a JSON array. NOTE 2: The elements of this JSON array will contain JSON values that play for JAdES signatures the same role as the role played by the unsigned attributes for CAdES signatures, and the role played by the unsigned qualifying properties for XAdES signatures. NOTE 3: An immediate consequence is that an electronic time-stamp present within the arcTst object specified in clause 5.3.6.2 of the present document, protects the JWS Payload, the JWS Protected Header, the JAdES Signature Value, and the etsiU header parameter within the JWS Unprotected Header. Header parameters defined by IETF RFC 7515 [2] and IETF RFC 7797 [14] not further profiled within the present document may be added as header parameters within the JAdES signature, following the requirements specified in the present document. In JAdES signatures, the JWS Payload may be attached or detached. Detached JWS Payload may either be one detached object, or result from the concatenation of more than one detached data objects. See the specification of sigD signed header parameter in clause 5.2.8 of the present document. NOTE 4: At the moment of producing the present document, JSON Schema was under development. The working draft being used at the present document was the one specified by draft-handrews-json-schema-01 [19], and draft-handrews-json-schema-validation-01 [i.15]. These documents, though, do not correspond to the latest version (draft-handrews-json-schema-02 [i.14], and draft-handrews-json-schema-validation-02 [i.15]) due to the fact that tools checking correctness of JSON schema files have not been yet completed. The drafts of JSON schema specifications may be accessed at JSON Schema Specification in json-schema.org website [i.13]. NOTE 5: Although at the moment of producing the present document there exist several proposals for JSON canonicalization algorithms, none have been formally adopted by any standardization organization. Nevertheless, the present document uses placeholders for identifiers of canonicalization algorithms in a number of components that could use them if such algorithms are standardized in the future. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 13
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5 Header parameters semantics and syntax
|
5.1 Use of header parameters defined in IETF RFC 7515, IETF RFC 7797, and IETF RFC 7519
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.1 Introduction
|
This clause defines additional requirements for the use of some of header parameters specified in IETF RFC 7515 [2]. JAdES signatures may incorporate any of the header parameters specified in IETF RFC 7515 [2] and IETF RFC 7797 [14]. NOTE: Clause 6.3 also specifies requirements (mainly of presence and cardinality), for the use of some of the header parameters specified in IETF RFC 7515 [2] for JAdES baseline signatures.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.2 The alg (X.509 URL) header parameter
|
Semantics The alg header parameter shall be a signed header parameter that qualifies the signature. The alg header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.1. Syntax The alg header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.1. The algorithm should be one of the algorithms for digital signatures recommended by in ETSI TS 119 312 [21]. The identifier of the algorithm shall be one of the identifiers registered at the IANA "JSON Web Signature and Encryption Algorithms" (https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms).
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.3 The cty (content type) header parameter
|
Semantics The cty header parameter shall be a signed header parameter that qualifies the JWS Payload. The cty header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.10. The cty header parameter should not be present if the sigD header parameter, specified in clause 5.2.8 of the present document, is present within the JAdES signature. The cty header parameter should not be present if the content type is implied by the JWS Payload. The cty header parameter shall not be present if the JWS Payload is a (counter-signed) signature. NOTE: The sigD header parameter has one member that contains information of the format and type of the constituents of the JWS Payload. Syntax The cty header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.10.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.4 The kid (key identifier) header parameter
|
Semantics The kid header parameter shall be a signed header parameter that qualifies the signature. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 14 The kid header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.4. The content of kid header parameter should be the base64 (IETF RFC 4648 [12]) encoding of one DER-encoded instance of type IssuerSerial type defined in IETF RFC 5035 [5]. The header parameter kid shall be used as a hint that can help to identify the signing certificate if other header parameters referencing or containing the signing certificate are present in the JAdES signature. Syntax The kid header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.4.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.5 The x5u (X.509 URL) header parameter
|
Semantics The x5u header parameter shall be a signed header parameter that qualifies the signature. The x5u header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.5. The x5u member shall be used as a hint, as implementations can have alternative ways for retrieving the referenced certificate if it is not found at the referenced place. Syntax The x5u header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.5.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.6 The x5t (X.509 Certificate SHA-1 Thumbprint) header parameter
|
JAdES signatures shall not contain the x5t header parameter specified in clause 4.1.7 of IETF RFC 7515 [2]. 5.1.7 The x5t#S256 (X.509 Certificate SHA-256 Thumbprint) header parameter Semantics The x5t#S256 shall be a signed header parameter that qualifies the signature. The x5t#S256 header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.8. Syntax The x5t#S256 header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.8. A JAdES signature shall have at least one of the following header parameters in its JWS Protected Header: x5t#S256 (specified in clause 4.1.8 of IETF RFC 7515 [2]), x5c (specified in clause 4.1.6 of IETF RFC 7515 [2]), sigX5ts (specified in clause 5.2.2.3 of the present document), or x5t#o (specified in clause 5.2.2.2 of the present document). NOTE 1: The simultaneous presence of x5t#S256 and x5t#o header parameters is allowed for facilitating interoperability whilst implementations migrate from x5t#S256 to x5t#o. NOTE 2: Profiles of JAdES can allow some of the combinations of the aforementioned header parameters.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.8 The x5c (X.509 Certificate Chain) header parameter
|
Semantics The x5c header parameter shall be a signed header parameter. The x5c header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.6. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 15 Syntax The x5c header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.6.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.9 The crit (critical) header parameter
|
Semantics The crit header parameter shall be a signed header parameter that qualifies the signature. The crit header parameter shall have the semantics specified in IETF RFC 7515 [2], clause 4.1.11. Syntax The crit header parameter shall have the syntax specified in IETF RFC 7515 [2], clause 4.1.11. If the JAdES signature includes the sigD header parameter, the crit header parameter shall also be present and "sigD" shall be one of its JSON array elements. NOTE 1: The requirement of mandating that all the names of the signed header parameters are elements of the crit JSON array, present in version 1.1.1 of the present document, has been suppressed after receiving comments qualifying it as problematic because it could not be properly managed by plane JWS processing applications. With this reformulation any JAdES signature that does not incorporate the sigD header parameter can be (partly) processed by a plane JWS processing application (it will not process the JAdES signed parameters, which is OK if the signature policy allows it). NOTE 2: This change requires JAdES v1.1.1 processing applications to be modified to consider conformant JAdES signatures that do not contain names of the signed header parameters defined by the present document within the crit JSON array when the JAdES signature does not incorporate the sigD header parameter.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.10 The b64 header parameter
|
Semantics The b64 header parameter shall be a signed header parameter. The b64 header parameter shall have the semantics specified in IETF RFC 7797 [14], clause 3. Syntax The b64 header parameter shall have the syntax specified in IETF RFC 7797 [14], clause 3. If the sigD header parameter is present with its member set to "http://uri.etsi.org/19182/HttpHeaders" then the b64 header parameter shall be present and set to "false".
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.1.11 The iat (claimed signing time) header parameter
|
Semantics In JAdES signatures, the iat header parameter shall be a signed header parameter. In JAdES signatures, the iat header parameter's value shall specify the time at which the signer claims to have performed the signing process. Syntax The syntax of the iat header parameter shall be as specified in IETF RFC 7519 [22], clause 4.1.6. Its value shall be an integer number, instance of the NumericDateValue type, which is defined in IETF RFC 7519 [22], clause 2. The value of the iat header parameter shall not contain fractions of seconds. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 16 The iat header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information: "iat": {"type": "integer"}, Before 2025-07-15T00:00:00Z, this header parameter should be incorporated in new JAdES signatures instead of the sigT header parameter specified in clause 5.2.1 of the present document. Starting at 2025-07-15T00:00:00Z, this header parameter shall be incorporated in new JAdES signatures. NOTE 1: The iat header parameter has been incorporated with this semantics following the recommendation by Designated Experts that assessed the ETSI TC ESI's request of registering within the IANA the header parameters defined by JAdES in the JSON Web Signature and Encryption Header Parameters Registry (https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-header-parameters). NOTE 2: The date and time value indicated by 2025-07-15T00:00:00Z follows the format specified in ISO 8601-1 [23]. NOTE 3: This period of roughly one year from the publication of the present document until the date and time 2025-07-15T00:00:00Z, is for giving time to applications that generate JAdES signatures to generate them incorporating iat header parameter instead of sigT.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2 New signed header parameters
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.1 The sigT (claimed signing time) header parameter
|
Semantics The sigT header parameter shall be a signed header parameter that qualifies the signature. The sigT header parameter's value shall specify the time at which the signer claims to have performed the signing process. Syntax The sigT header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information: "sigT": {"type": "string", "format": "date-time"}, The contents of the string: 1) Shall be formatted as specified in IETF RFC 3339 [15]. 2) Shall be the UTC time for date and time. 3) Shall not contain the part corresponding to fraction of seconds. EXAMPLE: "2019-11-19T17:28:15Z". Before 2025-07-15T00:00:00Z this header parameter should not be incorporated in new JAdES signatures. Instead, the iaT header parameter should be included. Starting at 2025-07-15T00:00:00Z this header parameter shall not be incorporated in new JAdES signatures. NOTE 1: The former requirements do not recommend (although still allow it) the incorporation of the sigT header parameter in new JAdES signatures from the moment of the publication of the present document until just before 2025-07-15T00:00:00Z, and prohibit its incorporation in new JAdES signatures from 2025-07-15T00:00:00Z onwards. This is for giving time to applications that generate JAdES signatures to generate them incorporating iat header parameter instead of sigT. Applications validating JAdES signatures shall be able to parse and process this header parameter. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 17 NOTE 2: This is because validation applications can be requested the validation of JAdES signatures generated before 2025-07-15T00:00:00Z incorporating the sigT header parameter.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.2 Header parameters for certificate references
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.2.1 Introduction
|
The present clause defines two new signed parameters namely, the x5t#o, which extends the semantics of x5t#S256 for allowing different digest algorithms than the SHA256, and the sigX5ts, which contains references to several certificates within the certification path, including one reference to the signing certificate, computed using a certain arbitrary digest algorithm.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.2.2 The x5t#o (X509 certificate digest) header parameter
|
Semantics The x5t#o header parameter shall be a signed header parameter that qualifies the signature. The x5t#o header parameter shall contain an identifier of a digest algorithm different than the identifier of SHA-256, and the digest value of the referenced certificate. NOTE 1: For instance, the signature validation policy can mandate the presence of references to all the certificates up to the trust anchor. NOTE 2: The identifier of SHA-256 is not allowed because for this algorithm, x5t#256 header parameter has been already specified in IETF RFC 7515 [2]. The x5t#o header parameter shall not contain any other information. Syntax The x5t#o header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1 and is copied below for information. "x5t#o": { "type": "object", "properties": { "digAlg": {"type": "string"}, "digVal": {"type": "string", "contentEncoding": "base64"} }, "required": ["digAlg","digVal"], "additionalProperties": false }, The digAlg member shall identify the digest algorithm. The identifier shall be one of the identifiers registered at the IANA "Named Information Hash Algorithm Registry" (https://www.iana.org/assignments/named-information/named- information.xhtml#hash-alg). The digVal member shall contain the base64url-encoded value of the digest computed on the DER-encoded certificate.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.2.3 The sigX5ts (X509 certificates digests) header parameter
|
Semantics The sigX5ts header parameter shall be a signed header parameter that qualifies the signature. The sigX5ts header parameter shall contain several references of certificates within the certification path of the signing certificate, each one formed by the identifier of a digest algorithm and the digest value of the referenced certificate. NOTE 1: This header parameter is not used when only the reference to the signing certificate is required. Instead, the x5t#o header parameter is used in such occasions. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 18 This element may contain digest values computed with algorithm SHA-256. NOTE 2: This is because in IETF RFC 7515 [2] there is not any header parameter that may contain a sequence of digest values of certificates. The first reference within the sigX5ts header parameter shall be the reference of the signing certificate. The sigX5ts header parameter shall not contain any other information. Syntax The sigX5ts header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information: "sigX5ts": { "type": "array", "items": {"$ref": "#/definitions/x5t%23o"}, "minItems": 2 },
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.3 The srCms (signer commitments) header parameter
|
Semantics The srCms header parameter shall be a signed header parameter that qualifies JWS Payload. The srCms header parameter shall indicate the commitment made by the signer when signing. The srCms header parameter shall express the commitment type with a URI. The srCms header parameter may contain a sequence of qualifiers providing more information about the commitment. NOTE 1: The commitment type can be: defined as part of the signature policy, in which case, the commitment type has precise semantics that are defined as part of the signature policy; or be a registered type, in which case, the commitment type has precise semantics defined by registration, under the rules of the registration authority. Such a registration authority can be a trading association or a legislative authority. NOTE 2: The specification of commitment type identifiers is outside the scope of the present document. For a list of predefined commitment type identifiers, see ETSI TS 119 172-1 [i.7]. Syntax This header parameter shall be carried in the JWS Protected Header. The srCms header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information: "srCms":{ "type": "array", "items": { "type": "object", "properties":{ "commId": {"$ref": "#/definitions/oId"}, "commQuals":{ "type": "array", "items": {"type":"object"}, "minItems": 1 } }, "required": ["commId"], "additionalProperties": false }, "minItems": 1 }, ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 19 Each item of the srCms header parameter shall indicate one commitment made by the signer, which may be further qualified. The commId member of every array item is an instance of oId type, which is specified in clause 5.4.1 of the present document, whose id member shall have a URI as value, uniquely identifying one commitment made by the signer. The commQuals member provides means to include additional qualifying information on the commitment made by the signer.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.4 The sigPl (signature production place) header parameter
|
Semantics The sigPl header parameter shall be a signed header parameter that qualifies the signer. The sigPl header parameter shall specify an address associated with the signer at a particular geographical (e.g. city) location. Syntax This header parameter shall be carried in the JWS Protected Header. The sigPl header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. NOTE: Its definition follows the specification of PostalAddress type in schema.org (https://schema.org/PostalAddress). "sigPl":{ "type": "object", "properties":{ "addressCountry": {"type": "string"}, "addressLocality": {"type": "string"}, "addressRegion": {"type": "string"}, "postOfficeBoxNumber": {"type": "string"}, "postalCode": {"type": "string"}, "streetAddress": {"type": "string"} }, "minProperties": 1, "additionalProperties": false }, This addressCountry member shall contain either the name of the country or its two-letter ISO 3166-1 [i.17] alpha-2 country code. This header parameter shall be carried in the JWS Protected Header.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.5 The srAts (signer attributes) header parameter
|
Semantics The srAts header parameter shall be a signed header parameter that qualifies the signer. The srAts header parameter shall encapsulate signer attributes (e.g. role). This header parameter may encapsulate the following types of attributes: • attributes claimed by the signer; • attributes certified in attribute certificates issued by an Attribute Authority; or/and • assertions signed by a third party. Syntax This header parameter shall be carried in the JWS Protected Header. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 20 The srAts header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information: "qArrays":{ "type": "array", "items": { "type": "object", "properties": { "mediaType": {"type": "string"}, "encoding": {"type": "string"}, "qVals": { "type": "array", "minItems": 1 } }, "required": ["mediaType", "encoding", "qVals"], "additionalProperties": false }, "minItems": 1 }, "srAts":{ "type": "object", "properties": { "certified":{ "type": "array", "items": {"$ref": "#/definitions/certifiedAttrs"}, "minItems": 1 }, "claimed": {"$ref": "#/definitions/qArrays"}, "signedAssertions": {"$ref": "#/definitions/qArrays"} }, "minProperties": 1, "additionalProperties": false }, "certifiedAttrs": { "type": "object", "properties": { "x509AttrCert":{"$ref": "#/definitions/pkiOb"}, "otherAttrCert":{"$ref": "#/definitions/pkiOb"} }, "oneOf":[ { "required":["x509AttrCert"] }, { "required":["otherAttrCert"] } ], "additionalProperties": false }, EXAMPLE: W3C Recommendation [i.11] defines a JSON model for credentials that could become content of the claimed member. As specified in the JSON schema above, the srAts header parameter may contain an array of claimed attributes (member claimed), an array of attribute certificates (member certified), an array of signed assertions (member signedAssertions), or any combination of the three mentioned arrays. NOTE 1: The incorporation of one of the mentioned arrays or a certain combination of arrays is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. The certifiedAttrs member shall contain a non-empty array of certified attributes, which shall be one of the following: • the base64 encoding of DER-encoded X509 attribute certificates conformant to Recommendation ITU-T X.509 [6] issued to the signer, within the X509AttrCert member; or • attribute certificates (issued, in consequence, by Attribute Authorities) in different syntax than the one specified in Recommendation ITU-T X.509 [6], within the OtherAttrCert member. The definition of specific OtherAttrCert is outside of the scope of the present document. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 21 The signedAssertions member shall contain a non-empty array of assertions signed by a third party. NOTE 2: A signed assertion is stronger than a claimed attribute, since a third party asserts with a signature that the attribute of the signer is valid. However, it is less restrictive than an attribute certificate. The claimed member shall contain a non-empty array of attributes claimed by the signer. Both the signedAssertions and the claimed members shall be instances of qArrays type. Each instance of this type shall be a JSON array whose elements are JSON objects. Each JSON object shall contain three members, namely: a) The mediaType member, which shall contain a string identifying the type of the signed assertions or the claimed attributes present in qVals member, and shall meet the requirements specified in clause 8.4 of draft-handrews-json-schema-validation-01 [i.15]. b) The encoding member, which shall contain a string identifying the encoding of the signed assertions or the claimed attributes present in qVals member, and shall meet the requirements specified in clause 8.3 of draft-handrews-json-schema-validation-01 [i.15]. c) The qVals member, which shall be a JSON array of at least one item. The elements of qVals JSON array shall be the values of the signed assertions or the claimed attributes encoded as indicated within the encoding member. NOTE 3: Instances of qArrays type allow to incorporate signed assertions and/or claimed attributes of different types and different encodings. The definition of specific content types for signedAssertions and claimed attributes is outside of the scope of the present document. NOTE 4: A possible content for signedAssertions can be a signed SAML [i.8] assertion. Empty srAts header parameters shall not be generated.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.6 The adoTst (signed data time-stamp) header parameter
|
Semantics The adoTst header parameter shall be a signed header parameter that qualifies the JWS Payload. The adoTst header parameter shall encapsulate one or more electronic time-stamps, generated before the signature production, whose message imprint computation input shall be the JWS Payload of the JAdES signature. Syntax This header parameter shall be carried in the JWS Protected Header. The adoTst header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "adoTst": {"$ref": "#/definitions/tstContainer"}, The message imprint computation input for the electronic time-stamp shall be an octet stream built as indicated below: • If the sigD header parameter, as specified in clause 5.2.8 of the present document, is absent then: a) If the b64 header parameter specified in clause 3 of IETF RFC 7797 [14] is present and set to "false" then concatenate the JWS Payload value. b) If the b64 header parameter specified in clause 3 of IETF RFC 7797 [14] is present and set to "true", OR it is absent, then concatenate the base64url-encoded JWS Payload. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 22 • Else, if the sigD header parameter is present: a) If the value of its mId member is "http://uri.etsi.org/19182/HttpHeaders" then concatenate the bytes resulting from processing the contents of its pars member as specified in clause 5.2.8.2 of the present document except the "Digest" string element. The processing of the "Digest" string element in the pars array shall consist in retrieving the bytes of the body of the HTTP message. NOTE 1: The rationale for this is that the body of an HTTP message is signed indirectly: the JWS signature value is computed, not on its value, but on its digest value computed with a certain digest algorithm. Therefore, in order to protect the HTTP body against the risk of the digest value becoming weak, the input to the electronic time-stamp's message imprint computation, should contain the digest value of the HTTP body computed with a strong digest algorithm, which may be different from the initial one if this is expected to become weak soon. b) If the value of its mId member is "http://uri.etsi.org/19182/ObjectIdByURI" or "http://uri.etsi.org/19182/ObjectIdByURIHash" then concatenate the bytes resulting from processing the contents of its pars member as specified in clause 5.2.8.3.2 of the present document. NOTE 2: The rationale for applying the processing specified in clause 5.2.8.3.2 of the present document to the case of the mechanism identified by "http://uri.etsi.org/19182/ObjectIdByURIHash" is the fact that this is an indirect signing mechanism, i.e. based on signing digest values of data objects, instead of the data objects themselves. Time-stamping not the digest values but the retrieved data objects, protects against future weaknesses of the digest algorithms used in sigD. If the JWS Payload is detached and the JAdES signature does not incorporate the sigD signed header parameter, then it is out of the scope to specify how to retrieve the JWS Payload. The adoTst header parameter shall not contain the canonAlg member.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.7 The sigPId (signature policy identifier) header parameter
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.7.1 Semantics and syntax
|
Semantics The sigPId header parameter shall be a signed header parameter qualifying the signature. The sigPId header parameter shall contain either an explicit identifier of a signature policy or an indication that there is an implied signature policy that the relying party should be aware of. NOTE: ETSI TS 119 172-1 [i.7] specifies a framework for signature policies. Syntax This header parameter shall be carried in the JWS Protected Header. The sigPId header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "sigPId": { "type": "object", "properties": { "id": {"$ref": "#/definitions/oId"}, "digAlg": {"type": "string"}, "digVal": {"type": "string", "contentEncoding": "base64"}, "digPSp": {"type": "boolean"}, "sigPQuals": { "type": "array", "items": {"$ref":"#/definitions/sigPQual"}, "minItems": 1 } }, "required": ["id"], ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 23 "additionalProperties": false }, The id member shall be used for referencing the signature policy explicitly. It shall uniquely identify a specific version of the signature policy. The digAlg and digVal members shall contain, respectively, the identifier of the digest algorithm and the base64url-encoded digest value of the object obtained after processing id. NOTE: The presence of digAlg and digVal members is use-case or policy dependent. Therefore, the present document does not include any recommendation in this sense. The digPSp member shall be a boolean. When present and set to "true", it shall indicate that the digest of the signature policy document has been computed as specified in a technical specification. Absence of this member shall be considered as if present and set to "false". If this member is present and set to "true", then the qualifier spDSpec qualifier shall be present and shall identify the aforementioned technical specification. The sigPQuals member shall be a non-empty array of qualifiers of the signature policy. The sigPQuals member may contain one or more qualifiers of the same type. Clause 5.2.7.2 specifies three signature policy qualifiers.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.7.2 Signature policy qualifiers
|
Semantics This clause specifies the following three qualifiers for the signature policy: • A URL where a copy of the signature policy document can be obtained (spURI choice). • A user notice that should be displayed when the signature is validated (spUserNotice choice). • An identifier of the technical specification that defines the syntax used for producing the signature policy document (spDSpec choice). Syntax The spURI , spUserNotice , and spDSpec qualifiers shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and are copied below for information. "sigPQual": { "type": "object", "properties": { "spUserNotice": {"$ref": "#/definitions/spUserNotice"}, "spURI": {"$ref": "#/definitions/spURI"}, "spDSpec": {"$ref": "#/definitions/spDSpec"} }, "minProperties": 1, "maxProperties": 1 }, "spURI": {"type": "string", "format": "uri"}, "spUserNotice": { "type": "object", "properties": { "noticeRef": { "type": "object", "properties": { "organization": {"type": "string"}, "noticeNumbers": { "type": "array", "items": {"type": "integer"}, "minItems" : 1 } }, "required": ["organization","noticeNumbers"], "additionalProperties": false }, ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 24 "explText": {"type": "string"} }, "minProperties": 1, "additionalProperties": false }, "spDSpec": {"$ref": "#/definitions/oId"}, The spURI qualifier shall contain a URL value where a copy of the signature policy document can be obtained. NOTE 1: This URL can reference, for instance, a remote site (which can be managed by an entity entitled for this purpose) from where (signing/validating) applications can retrieve the signature policy document. The spUserNotice qualifier shall contain information that is intended for being displayed whenever the signature is validated. The explText member shall contain the text of the notice to be displayed. NOTE 2: Other notices can come from the organization issuing the signature policy. The noticeRef member shall name an organization and shall identify by numbers (noticeNumbers member) a group of textual statements prepared by that organization, so that the application could get the explicit notices from a notices file. The spDSpec member shall identify the technical specification that defines the syntax used for producing the signature policy document.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8 The sigD header parameter
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8.1 Semantics and Syntax
|
Semantics The sigD header parameter shall be a signed header parameter. The sigD header parameter shall not appear in JAdES signatures whose JWS Payload is attached. The sigD header parameter may appear in JAdES signatures whose JWS Payload is detached. A JAdES signature shall have at most one sigD header parameter within each present JWS Protected Header. NOTE 1: Note that when using the General JWS JSON Serialization Syntax, it is possible to build a JAdES signature which allows multiple signers to sign the same JWS Payload. Each element of the signatures member of this serialization includes its own JWS Protected Header; therefore, each signer can include its own sigD header parameter. The sigD header parameter shall: 1) Reference one or more detached data objects. 2) Specify how the aforementioned references shall be processed for contributing to build the sequence of octets that shall be the JWS Payload of the JAdES signature. 3) Allow to define different mechanisms for meeting the two aforementioned requirements. 4) Chaining of references shall not be allowed. Only the data objects directly referenced within the sigD header parameter shall contribute to build the JWS Payload. If some referenced object contains in its turn references to other data objects, these last data objects shall not contribute to build the JWS Payload. NOTE 2: This is for avoiding building trees of referenced and distributed data objects, which would complicate the validation of JAdES signatures. The sigD header parameter may also incorporate base64url-encoded digest values of the referenced data objects within one string. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 25 The sigD header parameter may also incorporate any additional information for meeting requirements 1) and 2) as required by the mechanisms mentioned in 3). Syntax This header parameter shall be carried in the JWS Protected Header. The sigD header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "sigD":{ "type": "object", "properties": { "mId" : {"type":"string", "format": "uri"}, "pars" : { "type": "array", "items": {"type": "string"}, "minItems": 1 }, "hashM" : {"type":"string"}, "hashV" : { "type": "array", "items": {"type": "string","contentEncoding": "base64"}, "minItems": 1 }, "ctys" : { "type": "array", "items": {"type": "string"}, "minItems": 1 } }, "required": ["pars","mId"], "additionalProperties": false }, The mId member shall be present. It shall be an URI identifying the mechanism used for referencing and processing each referenced data object for building the JWS Payload. The present document defines 3 referencing mechanisms with their corresponding identifiers in clauses 5.2.8.2, 5.2.8.3.2 and 5.2.8.3.3. The pars member shall be present. It shall be a non-empty array of strings. Each element of the array shall contain a reference to one data object, as required by the identification mechanism identified in the mId member. The hashM member shall be a string identifying a digest algorithm. Its value shall be one of the identifiers defined in IETF RFC 7518 [16], or any future specification that amends, complements, or supersedes it. The presence of this member shall be conditional on the definition of the identification mechanism. If this member is present, then hashV member shall be present. The hashV member shall be a non-empty array of strings. Each element of the array shall contain: 1) The base64url-encoded digest value of the data object referenced by the parameter value that is present in the same position of the pars array if the b64 header parameter is present and set to "false". 2) The base64url-encoded digest value of the base64url-encoded data object referenced by the parameter value that is present in the same position of the pars array if the b64 header parameter is absent or it is present and set to "true". The presence of the hashV member shall be conditional on the definition of the identification mechanism. If this member is present, then hashM member shall be present. The ctys member shall be a non-empty an array of strings. The contents of each element of this array shall have the same semantics of the cty header parameter specified in clause 4.1.10 of IETF RFC 7515 [2]. There shall be as many elements within the ctys array as elements within the array pars. Each element of the ctys array shall contain the information corresponding to the data object referenced by the parameter value that is present in the same position of the pars array, except if the content type is implied by the data object or the data object is a counter-signed signature: in these cases, the element of the ctys array shall have as value an empty string. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 26
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8.2 Mechanism HttpHeaders
|
The URL identifying this referencing mechanism shall be "http://uri.etsi.org/19182/HttpHeaders". If this mechanism is used, then the b64 header parameter shall be present and set to "false". For this referencing mechanism, neither hashV, neither hashM member, nor ctys shall be present. Using this referencing mechanism, a JAdES signature may explicitly reference several HTTP headers and sign them, as well as the HTTP message body. For this referencing mechanism, the contents of the pars member shall be an array of lowercased names of HTTP header fields. The HTTP message body may also be signed by incorporating into the HTTP message the Digest HTTP header specified in clause 4.3.2 of IETF RFC 3230 [13], whose content is the digest of the message body. The HTTP headers shall be processed and concatenated in the order their lowercased names appear within the pars member to form the JWS Payload, as follows; a) If the HTTP header name is "(request target)" then generate the header field value by concatenating the lower-cased method (e.g. get, put), a space character, and the path and query parts of the target URI (the "path-absolute" production and optionally a '?' character followed by the "query" production see clauses 3.3 and 3.4 of IETF RFC 3986 [17]). b) If the header name is "(response status)" then generate the header field value containing the Status line as specified IETF RFC 2616 [18] clause 6.1 (HTTP 1.1) or IETF RFC 7540 [24] clause 8.1.2.4 (HTTP 2) but not including the newline character, which is added as specified in Item c) below. c) For other HTTP header names create the header field string by concatenating the lowercased header field name followed with a colon ':', a space character, and the header field value. Any leading and trailing white spaces are removed. If there are multiple instances of the same header field, all header field values associated with the header field shall be concatenated, separated by a ASCII comma and an ASCII space ', ', and used in the order in which they will appear in the transmitted HTTP message. d) Insert newline character after all but the last HTTP header value. NOTE 1: The above are equivalent to the steps required for signature string construction as defined in clause 2.3 of Internet draft draft-cavage-http-signatures-10 [i.12]. NOTE 2: Clauses 5.2.6 and 5.3.6.2.3 of the present document specify the processing of the "Digest" string element in the pars array in clauses for building its contribution to the message imprint computation input when generating electronic time-stamps encapsulated within the adoTst and arcTst respectively. That processing is required because in this mechanism the body of the HTTP message is indirectly signed (what is signed is its digest, not the HTTP message body itself).
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8.3 Mechanisms supported by URI-references
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8.3.1 General requirements
|
This clause specifies two mechanisms that use URI-references for referencing the data objects contributing to build the JWS Payload. For these referencing mechanisms, the contents of the pars member shall be an array of strings. Each string shall be an URI-reference, which, once resolved, shall result in an URI appertaining to the group of URIs that can be classified as locators according to clause 1.1.3 of IETF RFC 3986 [17]. Each URI-reference shall refer to one data object. NOTE: According to IETF RFC 3986 [17], URIs that can be classified as locators (URLs are the obvious example) "provide a means of locating the resource by describing its primary access mechanism". When resolving an URI-reference which is a relative reference, conforming applications shall set a default base HTTP scheme URI when applying clause 5.1.4 of IETF RFC 3986 [17]. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 27 Dereferencing URI-references in the HTTP scheme shall be supported. Dereferencing an URI-reference in the HTTP scheme shall comply with the Status Code Definitions specified in clause 10 of IETF RFC 2616 [18]. Dereferencing URI-references in other locator schemes may be supported. Dereferencing URI-references within one of such schemes shall be conducted as defined in the corresponding scheme specification.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8.3.2 Mechanism ObjectIdByURI
|
The URL identifying this referencing mechanism shall be "http://uri.etsi.org/19182/ObjectIdByURI". For this referencing mechanism, neither hashV , nor hashM shall be present. Member ctys may be present. The semantics and syntax of ctys shall be as specified in clause 5.2.8.1 of the present document. The stream of octets corresponding to the contribution of the JWS Payload to the computation of the JWS Signature Value shall be generated as indicated below: 1) Initialize the stream of octets to an empty stream. 2) While there are URI-references in the pars array not visited: - Take the next one. - Dereference the URI-reference, as specified in clause 5.2.8.3.1 of the present document. - If the b64 header parameter specified in clause 3 of IETF RFC 7797 [14] is absent or is present and set to "true", then base64url encode the retrieved object octets. - Concatenate the resulting octets to the stream of octets to be signed.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.2.8.3.3 Mechanism ObjectIdByURIHash
|
The URL identifying this referencing mechanism shall be "http://uri.etsi.org/19182/ObjectIdByURIHash". For this referencing mechanism, the hashV, and the hashM members shall be present. Member ctys may be present. The semantics and syntax of hashM, hashV ,and ctys shall be as specified in clause 5.2.8.1 of the present document. For computing the digest values, whose base64url encodings appear within the hashV member, each data object referenced within the pars member, shall be retrieved as specified in clause 5.2.8.3.1 of the present document. When using this mechanism, the JWS Payload shall contribute as an empty stream to the computation of the JWS Signature Value. NOTE 1: As this sigD is a signed header parameter, and it already includes the digest of the components of the JWS Payload, the JWS Payload is indirectly signed by signing the sigD signed header parameter, and consequently, this referencing mechanism does not require that the JWS Payload directly contributes to the computation of the JWS Signature Value. If the JWS Payload is required for other purposes than computing the JWS Signature Value when this mechanism is used, it shall be generated as specified in clause 5.2.8.3.2. NOTE 2: The generation of this JWS Payload is required, for instance, for generating the adoTst or the arcTst header parameters. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 28
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3 New unsigned header parameter
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.1 The etsiU header parameter
|
Semantics The etsiU unprotected header parameter shall be a JSON array whose elements contain JSON values that are not signed by the JAdES signature. NOTE 1: The rationale for this is as follows: the computation of certain electronic time-stamps message imprints is performed by digesting the concatenation of sets of unsigned header parameters, and this concatenation needs to be performed following an order; the JSON array allows to define such an order: the unsigned header parameters are concatenated following the order of appearance within the JSON array. NOTE 2: As it has been specified in clause 4 of the present document etsiU header parameter is incorporated in the JWS Unprotected Header specified in clause 3.2 of IETF RFC 7515 [2]. Consequently, all its elements will also be unprotected, and its elements will play in JAdES signatures the same role as the role played by the unsigned attributes for CAdES signatures, and the role played by the unsigned qualifying properties for XAdES signature. The etsiU header parameter shall contain JSON values that qualify the JAdES signature itself, or the signer, or the JWS Payload. NOTE 3: Because the etsiU header parameter is present within the JWS Unprotected Header, then JWS JSON Serialization as specified in IETF RFC 7515 [2], clause 3.2, needs to be employed as the alternative to JWS Compact Serialization. New JSON values shall always be added at the end of the etsiU array. NOTE 4: This implies that the order in the etsiU array reflects the order in the generation of the JSON values. This is of special relevance for containers of time-stamps and the unsigned attributes their electronic time- stamps time-stamp. The components present within the etsiU header parameter shall appear as clear instances of unsigned components or as their corresponding base64url encodings. NOTE 5: While clear instances of unsigned components require some type of canonicalization if they contribute to the computation of a time-stamp message imprint, their base64url-encoded values will not require such canonicalization. The present document is neutral about which alternative should be used. NOTE 6: The contents of the components of the etsiU header parameters can appear as clear instances of unsigned components or as their corresponding basee64url encodings regardless the presence or absence of the b64 header parameter and its value if present, as the b64 header parameter only affects to the JWS Payload representation and the input to the JWS Signature Value computation. The present document specifies: 1) A JSON object (sigPSt) containing details for facilitating access to a signature policy document, in clause 5.3.3. 2) A JSON object (cSig) containing details for containing a counter-signature of the JAdES signature itself, in clause 5.3.2. 3) A JSON object (sigTst) containing a electronic time-stamp on the JWS Signature Value, in clause 5.3.4. 4) A JSON array (xVals) containing CA certificates required for validating the signature, in clause 5.3.5.2. 5) A JSON object (rVals) containing values of revocation data required for validating the signature, in clause 5.3.5.3. 6) A JSON array (axVals) containing certificates of Attribute Authorities required for validating the signature, in clause 5.3.5.4. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 29 7) A JSON object (arVals) containing values of revocation data of Attribute Authorities required for validating the signature, in clause 5.3.5.5. 8) A JSON array (anyValData) containing revocation data on certificates in the certification path of the JAdES signature and/or the certification paths of present signatures, issued at a different time than the revocation data present in the rVals object for meeting freshness requirements for revocation data defined by a specific creation/augmentation/validation policy, in clause 5.3.5.6. 9) A JSON object (tstVD) containing validation data (certificate and values of revocation data) for electronic time-stamps present in the signature, in clause 5.3.6.1. 10) A JSON object (arcTst) containing one or more electronic time-stamps on all the components of the JAdES signature, in clause 5.3.6.2. 11) A JSON array (xRefs) containing references to certificates required for validating the signature, in clause A.1.1. 12) A JSON object (rRefs) containing references to revocation data required for validating the signature, in clause A.1.2. 13) A JSON array (axRefs) containing references to certificates of Attribute Authorities required for validating the signature, in clause A.1.3. 14) A JSON object (arRefs) containing references to revocation data of Attribute Authorities required for validating the signature, in clause A.1.4. 15) A JSON object (sigRTst) containing a electronic time-stamp on the references to the validation material and the JWS Signature Value, in clause A.1.5.1. 16) A JSON object (rfsTst) containing an electronic time-stamp on the references to the validation material, in clause A.1.5.2. All the JSON arrays and JSON objects listed above shall be placed within the etsiU header parameter if they are incorporated into the JAdES signature. Syntax The etsiU header parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "etsiU": { "type": "array", "oneOf": [ { "items": {"$ref": "#/definitions/etsiUClearInstance"} }, { "items": {"type": "string", "contentEncoding": "base64"} } ], "minItems": 1 }, "etsiUClearInstance": { "type": "object", "properties": { "sigPSt": {"$ref": "#/definitions/sigPSt"}, "sigTst": {"$ref": "#/definitions/sigTst"}, "xVals": {"$ref": "#/definitions/xVals"}, "rVals": {"$ref": "#/definitions/rVals"}, "axVals": {"$ref": "#/definitions/axVals"}, "arVals": {"$ref": "#/definitions/arVals"}, "anyValData": {"$ref":"#/definitions/anyValData"}, "tstVD": {"$ref": "#/definitions/tstVD"}, "arcTst": {"$ref": "#/definitions/arcTst"}, "xRefs": {"$ref": "#/definitions/xRefs"}, "rRefs": {"$ref": "#/definitions/rRefs"}, "axRefs": {"$ref": "#/definitions/axRefs"}, "arRefs": {"$ref": "#/definitions/arRefs"}, "sigRTst": {"$ref": "#/definitions/sigRTst"}, ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 30 "rfsTst": {"$ref": "#/definitions/rfsTst"}, "cSig": {"$ref": "rfcs/rfc7515.json#/definitions/jws"} }, "minProperties": 1, "maxProperties": 1 } The etsiU header parameter shall be a non-empty array. The etsiU header parameter shall be incorporated as member of the header JSON object of the JAdES signature. NOTE 7: The JSON schema file rfc7515.json, referenced within the etsiUClearInstance, is distributed by ETSI within subfolder rfcs. See clause B.1 for details on the location of the JSON schema files. NOTE 8: The header member is the place reserved by IETF RFC 7515 [2] for unsigned header parameters in JSON Web Signatures. Clause 3.2 of IETF RFC 7515 [2] leaves its content open. The present document suitably profiles its contents. NOTE 9: The cSig member, specified in clause 5.3.2 of the present document, is a countersignature of the JAdES signature. Its inner structure is defined in a separate JSON schema file whose details appear in clause B.1 of the present document, which is provided for helping implementations to validate the inner structure of JSON Web Signatures. The content of any element of the etsiU array shall be either an unsigned JSON value in clear (clear JSON incorporation), or its base64url encoding (base64url incorporation). The array shall not contain JSON values in clear in some positions, and base64url encoded unsigned JSON values in others. Either all of them shall be incorporated in clear or shall be incorporated base64url encoded. The etsiU header parameter should be the only header parameter incorporated to the JWS Unprotected Header. Any unprotected JSON value that is not specified in the present document should be incorporated as an element of the etsiU header parameter. NOTE 10: Adding these components into the etsiU header parameter allows to properly secure them in the long- term using arcTst. If the etsiU header parameter contains JSON values in clear, instances of tstContainer type shall have the canonAlg member, except for the sigTst JSON object. If the etsiU header parameter contains bas64url-encoded JSON values, instances of tstContainer type shall not have the canonAlg member.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.2 The cSig (counter signature) JSON object
|
Semantics The cSig JSON object shall contain one counter signature of the JAdES signature where cSig is incorporated. This counter signature may also be a JAdES signature. Syntax The cSig JSON object contains one JSON Web Signature (which may also be a JAdES signature) that signs the JWS Signature Value of the embedding JAdES signature. NOTE 1: The use of a JWS or a JAdES as counter-signature is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. Discriminating whether the counter-signature is a JWS or a JAdES can be done by checking its sets of protected and unprotected header parameters; if the contents of these sets are according to the requirements in Table 1 in clause 6.3 of the present document, then the counter-signature is a JAdES signature. Otherwise it is a non-JAdES JWS. A JWS counter-signature may be serialized as specified in IETF RFC 7515 [2]. A JAdES counter-signature may be serialized as specified in clause 4 of the present document. NOTE 2: The use of a specific type of serialization is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 31 One JAdES counter signature may itself be counter signed using a cSig JSON object, signing the JWS Signature Value of the first counter signature, built as described above. NOTE 3: This is an alternative way of constructing arbitrarily long series of counter signatures, each one signing the JWS Signature Value of the one where it is directly embedded. Once an archive time-stamp has been added to the JAdES signature (see clause 5.3.6.2 of the present document) the contents of any enveloped countersignature can not be modified. Therefore, if there is the need of incorporating new validation material for these countersignatures, this may be done using the anyValData JSON object specified in clause 5.3.5.6 of the present document.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.3 The sigPSt JSON object
|
Semantics The sigPSt JSON object shall contain either: • the signature policy document which is referenced in the sigPId JSON object so that the signature policy document can be used for offline and long-term validation; or • a URI referencing a local store where the signature policy document can be retrieved. Syntax This JSON object shall be carried in the JWS Unprotected Header. The sigPSt shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and are copied below for information. "sigPSt": { "type":"object", "properties": { "sigPolDoc": {"type": "string", "contentEncoding": "base64"}, "sigPolLocalURI": {"type": "string", "format": "uri-reference"}, "spDSpec": {"$ref": "#/definitions/oId"} }, "oneOf": [ { "required": ["sigPolDoc"] }, { "required": ["sigPolLocalURI"] } ], "minProperties": 1, "additionalProperties": false }, The sigPolDoc member shall contain the base64url encoded signature policy. The sigPolLocalURI member shall have as value the URI referencing a local store where the present document can be retrieved. NOTE 1: Contrary to the spURI, the sigPolLocalURI points to a local file. The spDSpec member shall identify the technical specification that defines the syntax used for producing the signature policy document. NOTE 2: It is the responsibility of the entity incorporating the signature policy document to the signature-policy-store to make sure that the correct document is securely stored. NOTE 3: Being an unsigned JSON object, it is not protected by the digital signature. If the sigPId JSON object is incorporated into the signature and contains the digVal member with the digest value of the signature policy document, any alteration of the signature policy document present within sigPSt or within a local store, would be detected by the failure of the digests comparison. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 32
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.4 The sigTst JSON object
|
Semantics The sigTst JSON object shall encapsulate one or more electronic time-stamps time-stamping the JWS Signature Value. Syntax This JSON object shall be carried in the JWS Unprotected Header. The sigTst JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "sigTst": {"$ref": "#/definitions/tstContainer"}, The input of the message imprint computation for the electronic time-stamps encapsulated by sigTst JSON object shall be the base64url-encoded JWS Signature Value. NOTE: In a signature serialized with JWS JSON Serialization, this is the same as the content of the signature member. The sigTst JSON object shall not contain the canonAlg member.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5 JSON objects for validation data values
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5.1 Introduction
|
The present clause specifies the semantics and syntax for JAdES JSON values that enclose certificates and/or revocation data. A JAdES signature may contain certificates and/or revocation data within any of the JAdES JSON values specified in this clause 5.3.5 as long as the specific requirements defined for each qualifying property are met. NOTE 1: ETSI TS 119 182-1 v1.1.1 [i.19] defined several header parameters for placing validation material, namely: xVals, rVals, axVals, arVals, and tstVD. They mimic similar containers of validation data in ETSI EN 319 132-1 (XAdES) [4] and ETSI EN 319 122-1 (CAdES) [i.2]. Each one contains validation material (certificates or revocation data), required for validating digital signatures signing specific objects (the corresponding clauses below provide the required details). After the publication of ETSI TS 119 182-1 v1.1.1 [i.19], use-cases were identified where this compartmentation presented problems. That is why the present document defines the header parameter anyValData, able to contain validation material (certificate values, revocation data, or both) required for validating digital signatures regardless the objects that they are signing. NOTE 2: The decision of using any of the mentioned header parameters is use-case or policy dependent. Therefore the present document does not make any recommendation in this sense.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5.2 The xVals JSON array
|
Semantics The xVals JSON array: 1) shall contain the certificate of the trust anchor, if such certificate does exist and if it is not already present within other component of the JAdES signature. If this certificate is present within another component of the JAdES signature, it should not be included; 2) shall contain the CA certificates within the signing certificate path that are not already present within other component of the JAdES signature. The certificates present within other component of the JAdES signature should not be included; 3) shall contain the signing certificate if it is not already present within other component of the JAdES signature. If this certificate is present within other component of the JAdES signature, it should not be included; ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 33 4) shall contain certificates used to sign revocation status information (e.g. CRLs or OCSP responses) of certificates in 1), 2) and 3), and certificates within their respective certificate paths that are not present in the signature. Certificate values present within the signature, including certificate values within the revocation status information themselves should not be included; 5) shall not contain CA certificates that pertain exclusively to the certificate paths of certificates used to sign attribute certificates or signed assertions within srAts, or electronic time-stamps; and 6) may contain a set of certificates used to validate any countersignature incorporated into the JAdES signature that are not present in other components of the JAdES signature or its countersignatures. This set may include any of the certificates listed in 1), 2), 3) and 4) referred to signing certificates of countersignatures instead of the signing certificate of the JAdES signature. The certificates present elsewhere in the JAdES signature or its countersignatures should not be included. Syntax The xVals array parameter shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "xVals": { "type": "array", "items": { "type":"object", "properties": { "x509Cert": {"$ref": "#/definitions/pkiOb"}, "otherCert": {"$ref": "#/definitions/pkiOb"} }, "oneOf": [ { "required": ["x509Cert"] }, { "required": ["otherCert"] } ], "additionalProperties": false }, "minItems": 1 }, An x509Cert item shall contain the base64 encoding of one DER-encoded X.509 certificate. An otherCert item is a placeholder for potential future new formats of certificates. NOTE: The main difference between xVals and the x5c header parameter defined in IETF RFC 7515 [2] clause 4.1.6, is that xVals may contain non X.509 certificates.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5.3 The rVals JSON object
|
Semantics The rVals JSON object: 1) shall contain revocation values corresponding to CA certificates within the signing certificate path if they are not already present within another component of the JAdES signature. It shall not contain a revocation value for the trust anchor. The revocation values present within another component of the JAdES signature should not be included; 2) shall contain a revocation value for the signing certificate if it is not already present within another component of the JAdES signature. If it is present within another component of the JAdES signature, it should not be included; 3) may contain revocation values corresponding to certificates used to sign CRLs or OCSP responses of 1) and 2) and certificates within their respective certificate paths. The revocation values present already present within another component of the JAdES signature should not be included; ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 34 4) shall not contain revocation values corresponding to CA certificates that pertain exclusively to the certificate paths of certificates used to sign attribute certificates or signed assertions within srAts, or electronic time-stamps; and 5) may contain revocation values corresponding to the signing certificate of any countersignature incorporated into the JAdES signature as well as to the CA certificates in its certificate path. This set may include any of the revocation values listed in 1), 2) and 3) referred to signing certificates of countersignatures instead of the signing certificate of the JAdES signature. However, those revocation values among the aforementioned ones that are already present in other components of the JAdES signature should not be included. Syntax The rVals JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "rVals": { "type": "object", "properties":{ "crlVals": { "type": "array", "items": {"$ref":"#/definitions/pkiOb"}, "minItems": 1 }, "ocspVals": { "type": "array", "items": {"$ref":"#/definitions/pkiOb"}, "minItems": 1 }, "otherVals": { "type": "array", "items": {"type":"object"}, "minItems": 1 } }, "minProperties": 1 , "additionalProperties": false }, crlVals member shall be a non-empty array of encoded X.509 CRLs [8]. Each item of crlVals array shall contain the base64 encoding of a DER-encoded X.509 CRLs [8]. If the validation data contain one or more Delta CRLs, the crlVals member shall contain the set of CRLs required to provide complete revocation lists. ocspVals member shall be a non-empty array of encoded OCSP responses [9]. Each item of ocspVals array shall contain the base64 encoding of a DER-encoded OCSPResponse defined in IETF RFC 6960 [9]. The otherVals member provides a placeholder for other revocation information that can be used in the future. Their semantics and syntax are outside the scope of the present document.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5.4 The axVals JSON array
|
Semantics The axVals JSON array: 1) shall contain the value(s) of the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature; 2) shall contain, if not present within the signature, the value(s) of the certificate(s) for the trust anchor(s) if such certificates exist, and the CA certificate values within path of the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. Certificate values present within the signature should not be included; and ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 35 3) may contain the certificate values used to sign CRLs or OCSP responses and the certificates values within their respective certificate paths, used for validating the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. Certificate values present within the signature, including certificate values within the revocation status information themselves should not be included. Syntax The axVals JSON array shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "axVals": {"$ref": "#/definitions/xVals"}, NOTE: The main difference between axVals and the x5c header parameter defined in IETF RFC 7515 [2] clause 4.1.6, is that axVals may contain non X.509 certificates.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5.5 The arVals JSON object
|
Semantics The arVals JSON object: 1) shall contain the revocation value(s) of the certificate(s) that sign the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature; 2) shall contain, if not incorporated into the signature, the revocation values corresponding to CA certificates within the path(s) of the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. It shall not contain revocation values for the trust anchors. Values already incorporated into the signature should not be included; and 3) may contain the revocation values on certificates used to sign CRLs or OCSP responses and certificates within their respective certificate paths, which are used for validating the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. Revocation values already incorporated into the signature should not be included. Syntax The arVals JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "arVals": {"$ref": "#/definitions/rVals"}, If the validation data contain one or more Delta CRLs, this JSON object shall include the set of CRLs required to provide complete revocation lists.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.5.6 The anyValData JSON object
|
Semantics The anyValData JSON object shall contain the certificates identified in 1), or the revocation data identified in 2), or both of them: 1) certificate values that are used for validating any digital signature present within any other component of the JAdES signature regardless the objects that they are signing (these can be, for instance, the digital signature value of the JAdES signature itself, any countersignature of the JAdES signature, or the digital signatures within any electronic time-stamp, attribute certificate, signed assertion, OCSP response, or CRL, or any other digital signature), without any restrictions; 2) revocation value(s) of the certificate(s) supporting any signature present within any other component of the JAdES signature mentioned in the previous bullet. NOTE 1: This JSON object allows to mimic, within JAdES, features already incorporated in PAdES and CAdES, namely: a component whose purpose is to contain certificates and validation material that can be used for validating any signature present within JAdES signatures, regardless of what these signatures are signing. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 36 NOTE 2: This JSON object also allows to properly deal with situations where different creation/validation/augmentation signature policies can be used. They, for instance, may establish different requirements on acceptable freshness of revocation material, and also allow different certificate paths. Therefore, a certain set of revocation data fully acceptable for a certain policy A, may be unacceptable, from the point of view of its freshness, for another policy B. Also a verifier can accept a different certificate path. This JSON object allows, for instance, including within a JAdES signature a set of revocation data whose freshness is acceptable for this last policy B, making the signature valid under both policies. Syntax The anyValData JSON object shall be an instance of validationVals type. Both are defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "validationVals": { "type": "object", "properties": { "xVals": {"$ref": "#/definitions/xVals"}, "rVals": {"$ref": "#/definitions/rVals"} }, "minProperties": 1 , "additionalProperties": false }, "anyValData": {"$ref": "#/definitions/validationVals"}, The xVals member shall contain the base-64 encoding of DER-encoded X.509 certificates used in the full verification of the JAdES signature, as mentioned in bullet 1) of the semantics specification. These certificates should not appear anywhere else within the JAdES signature. The rVals member shall contain revocation values used in the full verification of the JAdES signature, as mentioned in bullet 2) of the semantics specification. Its syntax shall be as specified in clause 5.4.2 of the present document. These revocation values should not appear anywhere else within the JAdES signature. If the validation data contain one or more Delta CRLs, this child element shall include the set of CRLs required to provide complete revocation lists. 5.3.6 JSON values for long term availability and integrity of validation material
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.6.1 The tstVD JSON object
|
Semantics The tstVD JSON object shall be a container for validation data required for carrying a full verification of the electronic time-stamps embedded within any of the different electronic time-stamp container JSON objects defined in the present document. The tstVD JSON object shall allow incorporating certificate values. The tstVD JSON object shall allow incorporating revocation values. Syntax The tstVD JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "tstVD": {"$ref": "#/definitions/validationVals"}, The xVals member shall contain certificates used in the full verification of electronic time-stamps. The xVals member may contain all the certificates required for a full verification of the electronic time-stamps. The xVals member may also contain only some of the certificate values if the rest are present elsewhere in the JAdES signature (for instance within the electronic time-stamp itself, or in other tstVD created for other electronic time-stamps). ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 37 The rVals member shall contain revocation values used in the full verification of electronic time-stamps embedded in one JAdES time-stamp container. The rVals member may contain all the revocation values required for a full verification of the electronic time-stamps. The rVals member may also contain only some of the revocation values if the rest are present elsewhere in the JAdES signature (for instance within the electronic time-stamp itself, or in other tstVD created for other electronic time-stamps). If the tstVD JSON object contains validation data for electronic time-stamps encapsulated in the adoTst header parameter then it shall be added at the beginning of the array within the etsiU header parameter. NOTE: The incorporation of the aforementioned tstVD JSON object cannot take place after the incorporation of the first arcTst JSON object, as this would break the verification of its message imprint. If the tstVD JSON object contains validation data for electronic time-stamps that are encapsulated in a JSON object different than the adoTst header parameter, then it shall be added in the array of the etsiU header parameter immediately after the item containing the aforementioned JSON object containing the electronic time-stamp.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.6.2 The arcTst JSON object
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.6.2.1 Semantics and syntax
|
Semantics The arcTst JSON object shall encapsulate electronic time-stamps computed on the JWS Payload, the JWS Protected Header, the JAdES Signature Value, and the etsiU JSON array within the JWS Unprotected Header at the time of generating each electronic time-stamp. The arcTst JSON object shall be placed within the etsiU JSON array within the JWS Unprotected Header. NOTE 1: The purpose of this JSON object is to tackle the long-term availability and integrity of the validation material. NOTE 2: As it has been anticipated in clause 4 any header parameter different than etsiU JSON array present within the JWS Unprotected Header is not protected by the time-stamps encapsulated by this JSON object. Syntax The arcTst JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "arcTst": {"$ref": "#/definitions/tstContainer"}, If the JAdES signature incorporates a cSig JSON object, all the required material for conducting the validation of the counter-signature shall be incorporated into the JAdES signature before generating the first arcTst JSON object. This may be done within the counter-signature itself or within the containers available within the counter-signed JAdES signature. The contents of the cSig JSON object should not be changed, once it has been time-stamped by the arcTst. NOTE 3: If a cSig JSON object is time-stamped by the arcTst, any ulterior change of its contents (by addition of unsigned JSON values if the countersignature is a JAdES signature, for instance) would make the validation of the arcTst, and, in consequence, the validation of the countersigned JAdES signature, fail. NOTE 4: The present document permits counter-signing a previously time-stamped countersignature with another cSig JSON object added to the JAdES signature after the time-stamp container. The tstContainer shall be as specified in clause 5.4.3.3 of the present document. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 38
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.6.2.2 Generation and incorporation of arcTst
|
The present clause describes the steps to perform for augmenting a JAdES signature by incorporation of a new arcTst JSON object: 1) If the JAdES signature misses certificates and/or revocation data required for validating the signed objects present in the JAdES signature, then these missing certificates and/or revocation data shall be incorporated to the JAdES signature before generating the electronic time-stamp(s) to be encapsulated by the new arcTst JSON object. 2) Any missing certificate and/or revocation data may be placed in any JAdES JSON value specified in clause 5.3.5 as long as the specific requirements defined for each qualifying property are met. 3) If the new arcTst JSON object has to be incorporated to a JAdES signature that uses Base64url incorporation for incorporating elements in the etsiU JSON array, then compute the message imprint for the new electronic time-stamp(s), as indicated in clause 5.3.6.2.3; otherwise (JAdES signature uses clear JSON incorporation for incorporating elements in the etsiU JSON array) compute the message imprint for the new electronic time-stamps(s) as indicated in clause 5.3.6.2.4. NOTE: Notice that, while the arcTs JSON object has not been yet created at this point in time, the type of elements in etsiU JSON array, has already been made, and therefore, which clause to follow for building the input to the message imprint computation, is also known. 4) Request as many electronic time-stamp(s) as required to the corresponding electronic time-stamp(s) Service Providers. 5) Build a new arcTs JSON object, encapsulating the electronic time-stamp(s)issued in the previous step. 6) Incorporate the new arcTs JSON object generated in the previous step as the last element in etsiU JSON array.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.6.2.3 Computation of message-imprint with Base64url incorporation
|
For computing the input to the message imprint computation, performing step 3) in clause 5.3.6.2.2, when the JAdES signature uses Base64url incorporation for incorporating elements in the etsiU JSON array, the steps listed below shall be performed: 1) If the sigD header parameter is absent then: a) If the b64 header parameter specified in clause 3 of IETF RFC 7797 [14] is present and set to "false" then concatenate the JWS Payload value. b) If the b64 header parameter specified in clause 3 of IETF RFC 7797 [14] is present and set to "true", OR it is absent, then concatenate the base64url-encoded JWS Payload. 2) If the sigD header parameter is present: a) If the value of its mId member is "http://uri.etsi.org/19182/HttpHeaders" then concatenate the bytes resulting from processing the contents of its pars member as specified in clause 5.2.8.2 of the present document except the "Digest" string element. The processing of the "Digest" string element in the pars array shall consist in retrieving the bytes of the body of the HTTP message. NOTE 1: The rationale for this is that the body of an HTTP message is signed indirectly: the JWS signature value is computed, not on its value, but on its digest value computed with a certain digest algorithm. Therefore, in order to protect the HTTP body against the risk of the digest value becoming weak, the input to the electronic time-stamp's message imprint computation, should contain the digest value of the HTTP body computed with a strong digest algorithm, which may be different from the initial one if this is expected to become weak soon. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 39 b) Else if the value of its mId member is "http://uri.etsi.org/19182/ObjectIdByURI" or "http://uri.etsi.org/19182/ObjectIdByURIHash" then concatenate the bytes resulting from processing the contents of its pars member as specified in clause 5.2.8.3.2 of the present document. NOTE 2: The rationale for applying the processing specified in clause 5.2.8.3.2 of the present document to the case of the mechanism identified by "http://uri.etsi.org/19182/ObjectIdByURIHash" is the fact that this is an indirect signing mechanism, i.e. based on signing digest values of data objects, instead of the data objects themselves. Time-stamping not the digest values but the retrieved data objects, protects against future weaknesses of the digest algorithms used in sigD. 3) Concatenate the character '.'. 4) Concatenate the value of the JWS Protected Header, base64url encoded, followed by the character '.'. 5) Concatenate the value of the JAdES Signature Value, base64url encoded. 6) Concatenate the character '.'. 7) Concatenate all the elements in etsiU JSON array into the final octet stream in the order of appearance within the etsiU JSON array. As a consequence of the previous process, for validating an electronic time-stamp placed within one specific arcTst JSON object present in a JAdES signature as specified in the first paragraph of this clause, its message imprint shall be built as indicated in steps 1) to 7), BUT replacing 7) with the following one: 7a) Concatenate the JSON values present in etsiU JSON array, that precede (appear BEFORE) the arcTst JSON object that contains the electronic time-stamp that is being validated, in the order they appear within the etsiU JSON array, into the final octet stream.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.3.6.2.4 Computation of message-imprint with JSON clear incorporation
|
For computing the input to the message imprint computation, performing step 3) in clause 5.3.6.2.2, when the JAdES signature uses clear JSON incorporation for incorporating elements in the etsiU JSON array, the steps listed in clause 5.3.6.2.3 shall be performed BUT replacing step 7) with the following one: 7b) Take all the elements in etsiU JSON array, in the order they appear within the etsiU JSON array, canonicalize each one of them using the canonicalization algorithm identified in canonAlg member, and concatenate each resulting octet stream to the final octet stream. As a consequence of the previous process, for validating an electronic time-stamp placed within one specific arcTst JSON object present in a JAdES signature as specified in the first paragraph of this clause, its message imprint shall be built as indicated in steps 1) to 7) of clause 5.3.6.2.3, BUT replacing 7) with the following one: 7c) Take all the elements in etsiU JSON array that precede (appear BEFORE) the arcTst JSON object that contains the electronic time-stamp that is being validated, in the order they appear within the etsiU JSON array, canonicalize each one of them using the canonicalization algorithm identified in canonAlg member, and concatenate each resulting octet stream to the final octet stream.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4 Generally useful syntax
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4.1 The oId data type
|
Semantics Instances of oId data type shall contain a unique and permanent identifier of one data object. Instances of oId data type may contain a textual description of the nature of the data object qualified by the instance of the oId data type. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 40 Instances of oId data type may contain a number of references to documents where additional information about the nature of the data object qualified by the instance of the objectId data type, can be found. Syntax The oId shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "oId": { "type": "object", "properties": { "id": {"type": "string", "format": "uri"}, "desc": {"type": "string"}, "docRefs":{ "type": "array", "items": {"type": "string", "format": "uri"}, "minItems": 1 } }, "required": ["id"], "additionalProperties": false }, The id member shall contain a permanent identifier. Once the identifier is assigned, it shall not be re-assigned again. The value of the id member shall be an URI. If the identifier of the object is an OID then the value of this member shall be encoded as an URN as specified by the IETF RFC 3061 [3]. If both an OID and a URI exist identifying one object, the URI value should be used in the id member. The desc member shall contain an informal text describing the object. The docRefs member shall contain an arbitrary number of URI values pointing to further explanatory documentation of the data object identified by the instance of this type.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4.2 The pkiOb data type
|
Semantics The pkiOb data type shall be used to incorporate PKI objects, which can be non-JSON encoded, into the JAdES signature. NOTE: Examples of such PKI objects, include X.509 certificates and revocation lists, OCSP responses, attribute certificates, and electronic time-stamps. Syntax The pkiOb type shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "pkiOb": { "type": "object", "properties":{ "encoding": {"type": "string", "format": "uri"}, "specRef": {"type": "string"}, "val": {"type": "string", "contentEncoding" : "base64"} }, "required": ["val"], "additionalProperties": false }, The content of this data type shall be the PKI object, base64 encoded. The encoding member's value shall be a URI identifying the encoding used in the original PKI object. The values for the URI shall be one of the values defined in clause 5.1.3 of ETSI EN 319 132-1 [4]. If the encoding member is not present, then the contents of val member shall be the result of base64 encoding the DER-encoded ASN.1 data. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 41
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4.3 Container for electronic time-stamps
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4.3.1 Introduction
|
The present document specifies JSON objects that act as electronic time-stamps containers. Electronic time-stamps within the aforementioned containers may time-stamp isolated components or concatenations of several components of JAdES signatures. This clause specifies a JSON type for containers of electronic time-stamps.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4.3.2 Containers for electronic time-stamps
|
Below follows the list of the electronic time-stamps containers that are defined by the present document: • Containers for electronic time-stamps proving that the JWS Payload has been created before certain time instant: adoTst. • Container for electronic time-stamps proving that the signature value has been computed before a certain time instant (to protect against repudiation in case of a key compromise): sigTst. • Container for electronic time-stamps time-stamping the signature and validation data values, for providing long term JAdES signatures: arcTst. • Containers for electronic time-stamps on components that contain references to validation data, namely: rfsTst and sigRTst. (specified in clause A.1.5 of the present document).
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
5.4.3.3 The tstContainer type
|
Semantics The tstContainer type shall: • allow encapsulating IETF RFC 3161 [7] electronic time-stamps as well as electronic time-stamps in other formats; • provide means for managing electronic time-stamps computed on a concatenation of JAdES components (including detached JWS Payload); and • allow encapsulating more than one electronic time-stamp generated for the same set of JAdES components (including detached JWS Payload), each one issued by different TSAs, for instance. Syntax The tstContainer type shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "tstContainer":{ "type": "object", "properties": { "canonAlg": {"type": "string", "format": "uri"}, "tstTokens": { "type": "array", "items": {"$ref":"#/definitions/tstToken"}, "minItems": 1 } }, "required": ["tstTokens"], "additionalProperties": false }, "tstToken":{ "type": "object", "properties":{ "type": {"type": "string"}, "encoding": {"type": "string", "format": "uri"}, "specRef": {"type": "string"}, ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 42 "val": {"type": "string", "contentEncoding" : "base64"} }, "required": ["val"], "additionalProperties": false }, The tstContainer's tstTokens member shall contain a non-empty array of JSON objects each one encapsulating one electronic time-stamp. The tstToken's type member shall identify the type of the electronic time-stamp. For IETF RFC 3161 [7] electronic time-stamps this member shall not be present. The tstToken's encoding member shall be an URI and shall identify the encoding used for the electronic time-stamp. For IETF RFC 3161 [7] electronic time-stamps this member shall not be present. The tstToken's specRef member shall identify the technical specification that has defined the used electronic time-stamp. For IETF RFC 3161 [7] electronic time-stamps this member shall not be present. Finally the tstToken's val member shall contain the base64 encoding of the electronic time-stamp itself. For IETF RFC 3161 [7] electronic time-stamps this member shall contain the base64 encoding of the DER-encoded electronic time-stamp. In JAdES signatures, the containers of electronic time-stamps time-stamping components within the etsiU unsigned header parameter, implicitly identify what components are time-stamped and how they contribute to the input of the message imprint's computation. No further information in the electronic time-stamp container is required. NOTE: This is because all the components of a JAdES signature are placed within JAdES signature itself. The tstContainer's canonAlg member shall contain the identifier of a canonicalization algorithm. If the tstContainer's canonAlg member is present, then the bytes concatenated for building the time-stamp's message imprint input, shall be the bytes resulting from applying the canonicalization algorithm to all the time-stamped JAdES components. If the tstContainer's canonAlg is absent then the bytes concatenated for building the time-stamp's message imprint input, shall be the bytes of each of the time-stamped JAdES components themselves.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
6 JAdES baseline signatures
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
6.1 Signature levels
|
Clause 6 defines four levels of JAdES baseline signatures, intended to facilitate interoperability and to encompass the life cycle of JAdES signature, namely: a) B-B level provides requirements for the incorporation of signed header parameters and some unsigned components within the etsiU unsigned header parameter when the signature is generated. b) B-T level provides requirements for the generation and inclusion, for an existing signature, of a trusted token proving that the signature itself actually existed at a certain date and time. c) B-LT level provides requirements for the incorporation of all the material required for validating the signature in the signature document. This level aims to tackle the long-term availability of the validation material. d) B-LTA level provides requirements for the incorporation of electronic time-stamps that allow validation of the signature long time after its generation. This level aims to tackle the long-term availability and integrity of the validation material. NOTE 1: ETSI TR 119 100 [i.6] provides a description on the life-cycle of a signature and the rationales on which level is suitable in which situation. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 43 NOTE 2: The levels c) to d) are appropriate where the technical validity of signature needs to be preserved for a period of time after signature creation where certificate expiration, revocation and/or algorithm obsolescence is of concern. The specific level applicable depends on the context and use case. NOTE 3: B-LTA level targets long term availability and integrity of the validation material of digital signatures over long term. The B-LTA level can help to validate the signature beyond many events that limit its validity (for instance, the weakness of used cryptographic algorithms, or expiration of validation data). The use of B-LTA level is considered an appropriate preservation and transmission technique for signed data. NOTE 4: Conformance to B-LT level, when combined with appropriate additional preservation techniques tackling the long term availability and integrity of the validation material is sufficient to allow validation of the signature long time after its generation. The assessment of the effectiveness of preservation techniques for signed data other than implementing the B-LTA level are out of the scope of the present document. The reader is advised to consider legal instruments in force and/or other standards (for example ETSI TS 101 533-1 [i.9] or IETF RFC 4998 [i.10]) that can indicate other preservation techniques. Annex C defines what needs to be taken into account when using other techniques for long term availability and integrity of validation data and incorporating a new component in the etsiU unsigned header parameter derived from these techniques into the signature.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
6.2 General requirements
| |
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
6.2.1 Algorithm requirements
|
The algorithms and key lengths used to generate and augment digital signatures should be as specified in ETSI TS 119 312 [21]. NOTE: Cryptographic suites recommendations defined in ETSI TS 119 312 [21] can be superseded by national recommendations. In addition, MD5 algorithm shall not be used as digest algorithm.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
6.2.2 Notation for requirements
|
The present clause describes the notation used for defining the requirements of the different JAdES signature levels. The requirements on the header parameters and certain other signature's components for each JAdES signature level are expressed in Table C.1. A row in the table either specifies requirements for a header parameter, other signature's component, or a service. A service can be provided by different header parameters, by other signature's components, or by other mechanisms (service provision options hereinafter). In these cases, the specification of the requirements for a service is provided by three or more rows. The first row contains the requirements of the service. The requirements for the header parameters, other signature's components, and/or mechanisms used to provide the service are stated in the following rows. Table 1 contains 8 columns. Below follows a detailed explanation of their meanings and contents: 1) Column "Header parameters/Elements in etsiU unsigned header parameter/Services": a) In the case where the cell identifies a Service, the cell content starts with the keyword "Service" followed by the name of the service. b) In the case where the header parameter or other signature's component provides a service, this cell contains "SPO" (for Service Provision Option), followed by the name of the header parameter or the other signature's component. c) Otherwise, this cell contains the name of the header parameter or the other signature's component. 2) Column "Presence in B-B level": This cell contains the specification of the presence of the header parameter or other signature's component, or the provision of a service, for JAdES-B-B signatures. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 44 3) Column "Presence in B-T level": This cell contains the specification of the presence of the header parameter or other signature's component, or the provision of a service, for JAdES-B-T signatures. 4) Column "Presence in B-LT level": This cell contains the specification of the presence of the header parameter or other signature's component, or the provision of a service, for JAdES-B-LT signatures. 5) Column "Presence in B-LTA level": This cell contains the specification of the presence of the header parameter or other signature's component, or the provision of a service, for JAdES-B-LTA signatures. Below follow the values that can appear in columns "Presence in B-B", "Presence in B-T", "Presence in B-LT", and "Presence in B-LTA": - "shall be present": means that the header parameter or signature's component shall be incorporated to the signature, and shall be as specified in the document referenced in column "References", further profiled with the additional requirements referenced in column "Requirements", and with the cardinality indicated in column "Cardinality". - "shall not be present": means that the header parameter or signature's component shall not be incorporated to the signature. - "may be present": means that the header parameter or signature's component may be incorporated to the signature, and shall be as specified in the document referenced in column "References", further profiled with the additional requirements referenced in column "Requirements", and with the cardinality indicated in column "Cardinality". - "shall be provided": means that the service identified in the first column of the row shall be provided as further specified in the SPO-related rows. This value only appears in rows that contain requirements for services. It does not appear in rows that contain requirements for header parameters or signature's components. - "conditioned presence": means that the incorporation to the signature of the item identified in the first column is conditioned as per the requirements referenced in column "Requirements" and requirements in specifications and clauses referenced by column "References", with the cardinality indicated in column "Cardinality". - "*": means that the header parameter or signature's component (service) identified in the first column should not be incorporated to the signature (provided) in the corresponding level. Upper signature levels may specify other requirements. NOTE: Incorporating an unsigned component within the etsiU header parameter that is marked with a "*" into a signature can lead to cases where a higher level cannot be achieved, except by removing the corresponding component. 6) Column "Cardinality": This cell indicates the cardinality of the header parameter or other signature's component. If the cardinality is the same for all the levels, only the values listed below appear. Otherwise the content specifies the cardinality for each level. See the example at the end of the present clause showing this situation. Below follows the values indicating the cardinality: - 0: The signature shall not incorporate any instance of the header parameter or the signature's component. - 1: The signature shall incorporate exactly one instance of the header parameter or the signature's component. - 0 or 1: The signature shall incorporate zero or one instance of the header parameter or the signature's component. - ≥ 0: The signature shall incorporate zero or more instances of the header parameter or the signature's component. - ≥ 1: The signature shall incorporate one or more instances of the header parameter or the signature's component. 7) Column "References": This shall contain either the number of the clause specifying the header parameter in the present document, or a reference to the document and clause that specifies the other signature's component. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 45 8) Column "Additional requirements and notes": This cell contains numbers referencing notes and/or letters referencing additional requirements on the header parameter or the other signature's component. Both notes and additional requirements are listed in Table 1.
|
56c69bb1addb2c7d832fdd049cafed81
|
119 182-1
|
6.3 Requirements on JAdES components and services
|
The four JAdES signature levels specified in the present clause shall be built as specified in clause 4 of the present document. Table 1 shows the presence and cardinality requirements on the signature header parameters, other components, and services indicated in the first column for the four JAdES baseline signature levels, namely: JAdES-B-B, JAdES-B-T, JAdES-B-LT, and JAdES-B-LTA). Additional requirements are detailed below the table suitably labelled with the letter indicated in the last column. NOTE 1: JAdES-B-B signatures that incorporate only the header parameters and other components that are mandatory in Table C.1, and that implement the mandatory requirements, contain the lowest number of header parameters and other components, with the consequent benefits for interoperability. In JAdES baseline signatures the components that act as electronic time-stamps containers shall encapsulate only IETF RFC 3161 [7] updated by IETF RFC 5816 [10] time-stamp tokens. Any header parameter specified in IETF RFC 7515 [2] or IETF RFC 7797 [14], and not further profiled in clause 5.1, may be present (cardinality of 0 or 1) in the four levels defined in Table 1. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 46 Table 1: Requirements for JAdES-B-B, JAdES-B-T, JAdES-B-LT, and JAdES-B-LTA signatures Header parameters/Elements in etsiU unsigned header parameter/Services Presence in B-B level Presence in B-T level Presence in B-LT level Presence in B-LTA level Cardinality References Additional requirements and notes alg shall be present shall be present shall be present shall be present 1 Clause 5.1.2 cty conditioned presence conditioned presence conditioned presence conditioned presence 0 or 1 Clause 5.1.3 2 kid may be present may be present may be present may be present 0 or 1 Clause 5.1.4 x5u may be present may be present may be present may be present 0 or 1 Clause 5.1.5 x5c Conditioned presence Conditioned presence Conditioned presence Conditioned presence 0 or 1 Clause 5.1.8 3 crit Conditioned presence Conditioned presence Conditioned presence Conditioned presence Clause 5.1.9 4 Service: Incorporation of claimed signing time shall be provided shall be provided shall be provided shall be provided iat Conditioned presence Conditioned presence Conditioned presence Conditioned presence 0 or 1 Clause 5.1.11 a sigT Conditioned presence Conditioned presence Conditioned presence Conditioned presence 0 or 1 Clause 5.2.1 a Service: signing a reference of the signing certificate Conditioned presence Conditioned presence Conditioned presence Conditioned presence 1 3 SPO: x5t#256 conditioned presence conditioned presence conditioned presence conditioned presence 0 or 1 Clause 5.1.7 SPO: x5t#o conditioned presence conditioned presence conditioned presence conditioned presence 0 or 1 Clause 5.2.2 SPO: sigX5ts conditioned presence conditioned presence conditioned presence conditioned presence 0 or 1 Clause 5.2.2 sigD may be present may be present may be present may be present 0 or 1 Clause 5.2.8 srAts may be present may be present may be present may be present 0 or 1 Clause 5.2.5 srCms may be present may be present may be present may be present 0 or 1 Clause 5.2.3 5 sigPl may be present may be present may be present may be present 0 or 1 Clause 5.2.4 sigPId may be present may be present may be present may be present 0 or 1 Clause 5.2.7 cSig may be present may be present may be present may be present ≥ 0 Clause 5.3.2 adoTst may be present may be present may be present may be present 0 or 1 Clause 5.3.3 6 sigPSt conditioned presence conditioned presence conditioned presence conditioned presence 0 or 1 Clause 5.3.3 b sigTst * shall be present shall be present shall be present B-B: ≥ 0 Clause 5.3.4 c, d 7 B-T, B-LT, B-LTA: ≥ 1 xVals * * conditioned presence conditioned presence 0 or 1 Clause 5.3.5.2 e anyValData * * conditioned presence conditioned presence ≥ 0 Clause 5.3.5.6 e, i ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 47 Header parameters/Elements in etsiU unsigned header parameter/Services Presence in B-B level Presence in B-T level Presence in B-LT level Presence in B-LTA level Cardinality References Additional requirements and notes xRefs * * shall not be present shall not be present B-B, B-T: 0 or 1 Clause A.1.1 f, g B-LT, B-LTA: 0 axVals * * conditioned presence conditioned presence 0 or 1 Clause 5.3.5.4 e axRefs * * shall not be present shall not be present B-B, B-T: 0 or 1 Clause A.1.3 f, g, h B-LT, B-LTA: 0 rVals * * conditioned presence conditioned presence 0 or 1 Clause 5.3.5.3 i rRefs * * shall not be present shall not be present B-B, B-T: 0 or 1 Clause A.1.2 B-LT, B-LTA: 0 arVals * * conditioned presence conditioned presence 0 or 1 Clause 5.3.5.5 i arRefs * * shall not be present shall not be present B-B, B-T: 0 or 1 Clause A.1.4 h B-LT, B-LTA: 0 sigRTst * * shall not be present shall not be present B-B, B-T: ≥ 0 Clause A.1.5.1 B-LT, B-LTA: 0 rfsTst * * shall not be present shall not be present B-B, B-T: ≥ 0 Clause A.1.5.2 B-LT, B-LTA: 0 Service: Incorporation of validation data for electronic time-stamps * * shall be provided shall be provided - - j, k 8 SPO: tstVD * * conditioned presence conditioned presence ≥ 0 Clause 5.3.6.1 SPO: certificate and revocation values embedded in the electronic time-stamp itself * * conditioned presence conditioned presence ≥ 0 - SPO: anyValData * * conditioned presence conditioned presence ≥ 0 Clause 5.3.5.6 j, k arcTst * * * shall be present ≥ 1 Clause 5.3.6.2 l, m ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 48 Additional requirements: a) Requirements for iat and sigT. Before 2025-07-15T00:00:00Z the generator should include the iat header parameter for indicating the claimed signing time in new JAdES signatures and should not include the iat header parameter for indicating the claimed signing time in new JAdES signatures. Starting at 2025-07-15T00:00:00Z the generator shall include the iat header parameter for indicating the claimed signing time in new JAdES signatures. b) Requirement for sigPSt. This header parameter may be incorporated into the JAdES signature only if the sigPId is also incorporated and it contains the digVal member with the digest value of the signature policy document. Otherwise, the sigPSt shall not be incorporated into the JAdES signature. c) Requirement for sigTst. Each sigTst shall contain only one electronic time-stamp. d) Requirement for sigTst. The electronic time-stamp encapsulated within the sigTst shall be created before the signing certificate has been revoked or has expired. e) Requirement for xVals, axVals, and anyValData. Duplication of certificate values within the signature should be avoided. f) Requirement for xRefs and axRefs. The references to certificates should not include the kid member. g) Requirement for xRefs and axRefs. The references to certificates shall not include the x5u member. h) Requirement for axRefs and arRefs. The axRefs and arRefs may be used when a at least an attribute certificate or a signed assertion is incorporated into the JAdES signature. Otherwise, axRefs and arRefs shall not be used. i) Requirement for rVals, arVals, and anyValData. Duplication of revocation values within the signature should be avoided. j) Requirement for service "incorporation of validation data for electronic time-stamps". The validation data for electronic time-stamps shall be present within the tstVD , within anyValData, or embedded in the electronic time-stamp itself. k) Requirement for service "incorporation of validation data for electronic time-stamps". The validation data for electronic time-stamps should not be embedded in the electronic time-stamp itself. l) Requirement for arcTst. Each arcTst may contain more than one electronic time-stamp issued by different TSAs. m) Requirement for arcTst. Before generating and incorporating a new arcTst, all the validation material required for validating the signed data in the JAdES signature shall be included. This validation material shall include all the certificates and all certificate status information (like CRLs or OCSP responses) required for: - validating the signing certificate; - validating the signing certificate of any countersignature incorporated into the signature; - validating any attribute certificate or signed assertion present in the signature; and - validating the signing certificate of any previous electronic time-stamp already incorporated into the signature within any JAdES electronic time-stamp container component (including any arcTst). NOTE 2: On cty, and ctys within sigD: see clauses 5.1.3 and 5.2.8.1 of the present document for details of their conditioned presence. NOTE 3: On x5c and service "signing a reference of the signing certificate". Clause 5.1.7 specifies the conditions that decide the presence or absence of the x5c, x5t#S256, sigX5ts, and x5t#o header parameters in a JAdES signature. NOTE 4: On crit. Clause 5.1.9 specifies the conditions that decide the presence or absence of the crit header parameter in a JAdES signature. NOTE 5: On srCms. As the content of srCms is a JSON array, it may contain several commitments. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 49 NOTE 6: On adoTst. This header parameter can contain more than one electronic time-stamp, coming from different TSAs. NOTE 7: On sigTst. Several instances of this component can be incorporated into the JAdES signature, coming from different TSAs. NOTE 8: On service "incorporation of validation data for electronic time-stamps": the incorporation of the validation material of the electronic time-stamps ensures that the JAdES signature actually contains all the validation material needed. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 50 Annex A (normative): Additional components Specification A.1 Components for references to validation data A.1.1 The xRefs JSON array Semantics The xRefs JSON array: 1) shall contain the reference to the certificate of the trust anchor if such certificate does exist, and the references to CA certificates within the signing certificate path; 2) shall not contain the reference to the signing certificate; 3) may contain references to certificates in the path of the certificates used for signing the electronic time-stamps already incorporated into the signature when the xRefs is incorporated, including references to the electronic time-stamps' signing certificates and references to certificates of trust anchors if such certificates do exist; 4) may contain references to the certificates used to sign CRLs or OCSP responses for certificates referenced by references in 1) and 3), and references to certificates within their respective certificate paths; and 5) shall not contain references to CA certificates that pertain exclusively to the certificate paths of certificates used to sign attribute certificates or signed assertions within srAts. NOTE 1: The references to certificates exclusively used in the validation of attribute certificate or signed assertions are stored within axRefs (see clause A.1.3). NOTE 2: The usage of this header parameter is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. Syntax The xRefs member shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "x5Ids": { "type": "array", "items": {"$ref": "#/definitions/certId"}, "minItems": 1 }, "certId":{ "type": "object", "properties":{ "digAlg": {"type": "string"}, "digVal": {"type": "string", "contentEncoding": "base64"}, "kid": {"type": "string", "contentEncoding" : "base64"}, "x5u": {"type": "string", "format": "uri-reference"} }, "required": ["digAlg","digVal"] , "additionalProperties": false }, "xRefs": {"$ref": "#/definitions/x5Ids"}, The digAlg member shall identify the digest algorithm. The identifier shall be one of the identifiers registered at the IANA "Named Information Hash Algorithm Registry" (https://www.iana.org/assignments/named-information/named- information.xhtml#hash-alg). The digVal member shall contain the base64url-encoded value of the digest computed on the DER-encoded certificate. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 51 The content of kid member should be the base64 encoding of one DER-encoded instance of type IssuerSerial type defined in IETF RFC 5035 [5]. NOTE 3: The information in the kid member is only a hint, that can help to identify the certificate whose digest matches the value present in the reference. But the binding information is the digest of the certificate. The x5u member shall provide an indication of where the referenced certificate can be found. NOTE 4: It is intended that the x5u member is used as a hint, as implementations can have alternative ways for retrieving the referenced certificate if it is not found at the referenced place. If at least one of the following: xVals, axVals, or the arcTst, is incorporated into the signature, all the certificates referenced in xRefs shall be present elsewhere in the signature. A.1.2 The rRefs JSON object Semantics The rRefs JSON object: 1) shall contain a reference to a revocation value for the signing certificate; 2) shall contain the references to the revocation values (e.g. CRLs or OCSP values) corresponding to CA certificates within the signing certificate path. It shall not contain references to revocation values for the trust anchor; NOTE 1: A trust anchor is by definition trusted, thus no revocation information for the trust anchor is used during the validation. 3) may contain references to revocation values (e.g. CRLs or OCSP values) corresponding to certificates in the path of signing certificates of electronic time-stamps already incorporated into the signature when the rRefs is incorporated. It shall not contain references to revocation values for the trust anchors of these certificates; 4) may contain references to the revocation values corresponding to certificates used to sign CRLs or OCSP responses referenced in references from 1), 2) and 3) and to certificates within their respective certificate paths; and 5) shall not contain references to the revocation values corresponding to CA certificates that pertain exclusively to the certificate paths of certificates used to sign attribute certificates or signed assertions within srAts. NOTE 2: The references to revocation values exclusively used in the validation of attribute certificate or signed assertions are stored within arRefs (see clause A.1.4). NOTE 3: The usage of this header parameter is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. References within rRefs may be references to CRLs, OCSP responses and other type of revocation data. Syntax rRefs shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "rRefs": { "type": "object", "properties": { "crlRefs": { "type": "array", "items": { "type": "object", "properties": { "digAlg": {"type": "string"}, "digVal": {"type": "string", "contentEncoding": "base64"}, "crlId": { "type": "object", "properties": { ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 52 "issuer": {"type": "string", "contentEncoding" : "base64"}, "issueTime": {"type": "string", "format": "date-time"}, "number": {"type": "number"}, "uri": {"type": "string", "format": "uri-reference"} }, "required": ["issuer","issueTime"], "additionalProperties": false } }, "required": ["digAlg","digVal"] , "additionalProperties": false }, "minItems": 1 }, "ocspRefs":{ "type": "array", "items": { "type": "object", "properties": { "ocspId": { "type": "object", "properties": { "responderId": { "type": "object", "properties": { "byName": {"type": "string", "contentEncoding" : "base64"}, "byKey": {"type": "string", "contentEncoding" : "base64"} }, "oneOf":[ { "required": ["byName"] }, { "required": ["byKey"] } ], "additionalProperties": false }, "producedAt": {"type": "string", "format": "date-time"}, "uri": {"type": "string", "format": "uri-reference"} }, "required": ["responderId", "producedAt"], "additionalProperties": false }, "digAlg": {"type": "string"}, "digVal": {"type": "string", "contentEncoding": "base64"} }, "required": ["ocspId","digAlg","digVal"], "additionalProperties": false }, "minItems": 1 }, "otherRefs": { "type": "array", "items": {"type":"object"}, "minItems": 1 } }, "minProperties": 1, "additionalProperties": false }, Empty rRefs shall not be incorporated. The crlRefs member shall contain an array of references to CRLs. Each item within the CRLRefs array shall contain one reference to one CRL. The digAlg member of one item within the crlRefs shall identify the digest algorithm. The identifier shall be one of the identifiers registered at the IANA "Named Information Hash Algorithm Registry"(https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg). The digVal member of one item within the crlRefs array shall contain the encoded value of the digest computed on the DER-encoded CRL referenced. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 53 The crlId member needs not to be present if the referenced CRL can be inferred from other information. The crlId member of the items within the crlRefs array shall include the name issuer in its issuer member. The value of crlId's issuer member shall fulfil the requirements specified in IETF RFC 3494 [11] for strings representing Distinguished Names. The crlId member of the items within the crlRefs array shall include the time when the CRL was issued in its issueTime member. The crlId member of the items within the crlRefs array may include the number of the CRL in its number member. NOTE 4: The number member is an optional hint helping to get the CRL whose digest matches the value present in the reference. The crlId's uri member shall indicate one place where the referenced CRL can be found. NOTE 5: It is intended that this component be used as a hint, as implementations can have alternative ways for retrieving the referenced CRL if it is not found at the referenced place. If one or more of the identified CRLs are a Delta CRL, this component shall include references to the set of CRLs required to provide complete revocation lists. The ocspRefs member shall contain a non-empty array of references to OCSP responses. Each item within the ocspRefs array shall contain one reference to one OCSP response. The ocspId member of the items within the ocspRefs array shall include an identifier of the responder in its responderID member. If the responder is identified by its name, then the responderID's byName member shall contain the base64 encoding of the DER-encoded a forementioned name. If the responder is identified by the digest of the server's public key computed as mandated in IETF RFC 6960 [9], then the base64 encoding of the DER-encoded of byKey field specified in IETF RFC 6960 [9] shall appear within the responderID's byKey member. The ocspId member of the items within the ocspRefs array shall include the generation time of the OCSP response in its producedAt member. The value in ocspId's producedAt member shall indicate the same time as the time indicated by the ProducedAt field of the referenced OCSP response. The ocspId's uri member shall indicate one place where the referenced OCSP response can be found. NOTE 6: This value is not the address where the OCSP service can be reached. In addition to that, it is intended that this component be used as a hint, as implementations can have alternative ways for retrieving the referenced OCSP response if it is not found at the referenced place. The digAlg member of one item within the ocspRefs shall identify the digest algorithm. The identifier shall be one of the identifiers registered at the IANA "Named Information Hash Algorithm Registry"(https://www.iana.org/assignments/named-information/named-information.xhtml#hash-alg). The digVal member of one item within the ocspRefs array shall contain the encoded value of the digest computed on the DER-encoded referenced OCSPResponse field defined in IETF RFC 6960 [9]. References to alternative forms of validation data may be included in this component making use of the otherRefs member, a sequence whose items may contain any kind of information. Their semantics and syntax are outside the scope of the present document. If at least one of the following: rVals, arVals, or the arcTst, is incorporated into the signature, all the revocation data referenced in rRefs shall be present elsewhere in the signature. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 54 A.1.3 The axRefs JSON array Semantics The axRefs JSON array: 1) shall contain, if they are not present within xRefs or x5t#o header parameters, the references to the trust anchors if certificates exist for them, and the references to CA certificates within the path of the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. References present within xRefs or x5t#o header parameters should not be included; 2) shall contain, if they are not present within xRefs or x5t#o header parameters, the reference(s) to the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. References present within xRefs or x5t#o header parameters should not be included; and 3) may contain references to the certificates used to sign CRLs or OCSP responses and certificates within their respective certificate paths, which are used for validating the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. References present within xRefs or x5t#o should not be included. NOTE 1: The usage of this header parameter is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. Syntax axRefs shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information: "axRefs": {"$ref": "#/definitions/x5Ids"}, If at least one of the following: xVals, axVals, or the arcTst, is incorporated into the signature, all the certificates referenced in axRefs shall be present elsewhere in the signature. NOTE 2: The information in the kid member is only a hint, that can help to identify the certificate whose digest matches the value present in the reference. But the binding information is the digest of the certificate. NOTE 3: It is intended that the x5u member is used as a hint, as implementations can have alternative ways for retrieving the referenced certificate if it is not found at the referenced place. A.1.4 The arRefs JSON object Semantics The arRefs JSON object: 1) shall contain, if they are not present within rRefs, the references to the revocation values corresponding to CA certificates within the path(s) of the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. It shall not contain a revocation value for the trust anchors. References present within rRefs should not be included; NOTE 1: A trust anchor is by definition trusted, thus no revocation information for the trust anchor is used during the validation. 2) shall contain, if they are not present within the rRefs, the references to the revocation value(s) for the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. References present within rRefs should not be included; and 3) may contain references to the revocation values on certificates used to sign CRLs or OCSP responses and certificates within their respective certificate paths, which are used for validating the signing certificate(s) of the attribute certificate(s) and signed assertion(s) incorporated into the JAdES signature. References present within rRefs component should not be included. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 55 NOTE 2: The usage of this header parameter is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. Syntax arRefs shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "arRefs": {"$ref": "#/definitions/rRefs"}, If one or more of the identified CRLs are a Delta CRL, this component shall include references to the set of CRLs required to provide complete revocation lists. If at least one of the following: rVals, arVals, or the arcTst, is incorporated into the signature, all the revocation data referenced in arRefs shall be present elsewhere in the signature. A.1.5 Time-stamps on references to validation data A.1.5.1 The sigRTst JSON object A.1.5.1.1 General Semantics The sigRTst JSON object shall encapsulate electronic time-stamps on the JWS Signature Value, the signature time- stamp, if present, and the JAdES components containing references to validation data. NOTE: The usage of this header parameter is use-case or policy dependent. Therefore, the present document does not make any recommendation in this sense. Syntax The sigRTst JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "sigRTst": {"$ref": "#/definitions/tstContainer"}, This JSON object shall contain an electronic time-stamp that time-stamps the member encapsulating the JWS Signature Value, and the following components when they are present: sigTst, xRefs, rRefs, axRefs, and arRefs. If none of the following components: xRefs, rRefs, axRefs, and arRefs is present, the sigRTst JSON object shall not be generated. A.1.5.1.2 Computation of the message imprint with Base64url incorporation When generating the sigRTst JSON object, the message imprint computation input shall be the concatenation of the components, in the order they are listed below: 1) The value of the base64url-encoded JWS Signature Value. NOTE: If the JAdES signature is serialized with JWS JSON Serialization, this is the value within the member signature. 2) The character '.'. 3) Those among the following components in their order of appearance within the etsiU array, base64url- encoded: - sigTst if it is present; - xRefs if it is present; - rRefs if it is present; ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 56 - axRefs if it is present; and - arRefs if it is present. A.1.5.1.3 Computation of the message imprint with JSON clear incorporation When generating the sigRTst JSON object, the message imprint computation input shall be the concatenation of the components, in the order they are listed below: 1) The value of the base64url-encoded JWS Signature Value. NOTE: If the JAdES signature is serialized with JWS JSON Serialization, this is the value within the member signature. 2) The character '.'. 3) Those among the following components in their order of appearance within the etsiU array, canonicalized using the canonicalization algorithm identified in canonAlg member: - sigTst if it is present; - xRefs if it is present; - rRefs if it is present; - axRefs if it is present; and - arRefs if it is present. A.1.5.2 The rfsTst JSON object A.1.5.2.1 Semantics and syntax Semantics The rfsTst JSON object shall encapsulate electronic time-stamps on the JAdES components containing references to validation data. Syntax The rfsTst JSON object shall be defined as in the JSON Schema file whose location is detailed in clause B.1, and is copied below for information. "rfsTst": {"$ref": "#/definitions/tstContainer"}, This JSON object shall contain an electronic time-stamp that time-stamps the following JAdES components when they are present: xRefs, rRefs, axRefs, and arRefs. If none of the aforementioned JAdES components is present, the rfsTst JSON object shall not be generated. A.1.5.2.2 Computation of the message imprint with Base64url incorporation When generating the rfsTst JSON object, the message imprint computation input shall be the concatenation of the components listed below, base64url encoded, in their order of appearance within the etsiU array: • xRefs if it is present; • rRefs if it is present; • axRefs if it is present; and • arRefs if it is present. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 57 A.1.5.2.3 Computation of the message imprint with clear JSON incorporation When generating the rfsTst JSON object, the message imprint computation input shall be the concatenation of the components listed below, canonicalized using the canonicalization algorithm identified in canonAlg member, in their order of appearance within the etsiU array: • xRefs if it is present; • rRefs if it is present; • axRefs if it is present; and • arRefs if it is present. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 58 Annex B (normative): JSON Schema files B.1 JSON Schema files location for JAdES components The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/19182-jsonSchema.json (19182-jsonSchema.json) contains the definitions of the components specified in the present document. The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/19182-protected-jsonSchema.json (19182-protected-jsonSchema.json) may be used by implementers to validate the conformance of the JWS Protected Header of a JAdES signature against the JSON Schema definitions within 19182-jsonSchema.json. The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/19182-unprotected-jsonSchema.json (19182-unprotected-jsonSchema.json) may be used by implementers to validate the conformance of the JWS Unprotected Header of a JAdES signature against the JSON Schema definitions within 19182-jsonSchema.json. Additionally, ETSI provides additional JSON schema files, for facilitating implementers to check the structure of JWS signatures. In case of conflicts between these JSON schemas and the IETF RFC 7515 [2], IETF RFC 7517 [i.16], and IETF RFC 7797 [14], IETF RFC 7515 [2], IETF RFC 7517 [i.16] and IETF RFC 7797 [14] shall take precedence. Below follows the list of these additional JSON schema files: • The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/rfcs/rfc7515.json (rfc7515.json). This file contains JSON schema definitions for the structures defined in IETF RFC 7515 [2]. • The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/rfcs/rfc7515-jws.json (rfc7515-jws.json). This file may be used by implementers for checking conformance of a JWS signature against the JSON Schema definitions in file rfc7515.json. • The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/rfcs/rfc7515-protected.json (rfc7515-protected.json). This file may be used by implementers for checking conformance of the JWS Protected Header of a JWS signature against the JSON Schema definitions in file rfc7515.json. • The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/rfcs/rfc7515-unprotected.json (rfc7515-unprotected.json). This file may be used by implementers for checking conformance of the JWS Unprotected Header of a JWS signature against the JSON Schema definitions in file rfc7515.json. • The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/rfcs/rfc7517.json (rfc7517.json). This file contains JSON schema definitions for the structures defined in IETF RFC 7517 [i.16]. • The file at https://forge.etsi.org/rep/esi/x19_182_JAdES/raw/v1.2.1/rfcs/rfc7797.json (rfc7797.json). This file contains JSON schema definitions for the structures defined in IETF RFC 7797 [14]. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 59 Annex C (informative): Correspondence between XAdES tags and JAdES tags C.1 Correspondence between XAdES qualifying properties tags and JAdES component tags Table C.1 shows the correspondence between the tags used by the XAdES qualifying properties and the tags used by the JAdES components. Table C.1: Correspondence between XAdES and JAdES tags XAdES tag JAdES tag UnsignedProperties etsiU SigningTime iat, sigT SigningCertificateV2 (reference to the signing certificate only -for extending semantics of x5t#256 specified in IETF RFC 7515 [2]) x5t#o SigningCertificateV2 (references to the signing certificate and other certificates within the cert path, for mimiking XAdES and CAdES). sigX5ts SignaturePolicyIdentifier sigPId SignatureProductionPlaceV2 sigPl SignerRoleV2 srAts DataObjectFormat cty AllDataObjectsTimeStamp adoTst CommitmentTypeIndication srCms CounterSignature cSig IndividualDataObjectsTimeStamp NA SignaturePolicyStore sigPSt SignatureTimeStamp sigTst OIdentifier oId EncapsulatedPKIDataType pkiOb ArchiveTimeStamp arcTst RefsOnlyTimeStampV2 rfsTst SigAndRefsTimeStampV2 sigRTst anyValData AnyValidationData CertificateValues xVals RevocationValues rVals AttrAuthoritiesCVals axVals AttributeRevocationValues arVals TimeStampValidationData tstVD CompleteCertificateRefs xRefs RevocationRefs rRefs AttributeCertificateRefsV2 axRefs AttributeRevocationRefs arRefs ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 60 Annex D (normative): Alternative mechanisms for long term availability and integrity of validation data There may be mechanisms to achieve long-term availability and integrity of validation data different from the ones described in clause 5.3.6. If such a mechanism is incorporated using an unsigned component into the signature, then for this mechanism shall be specified: 1) The clear specification of the semantics and syntax of the component including its unique identifier. 2) The strategy of how this mechanism guarantees that all necessary parts of the signature are protected by this component. 3) The strategy of how to handle signatures containing components defined in the present document. EXAMPLE: The objects defined in IETF RFC 4998 [i.10], annex A are examples of such alternative mechanisms but they only handle points 1) and 2). ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 61 Annex E (informative): IANA Considerations The present document registers the following header parameters in the IANA "JSON Web Signature and Encryption Header Parameters" registry established by IETF RFC 7515 [2]. NOTE 1: Header parameters whose "Header Parameter Usage Locations" are JWS/JAdES are considered to be Header Parameters that can be present in non-JAdES JWS, for meeting certain (business, regulatory, etc.) requirements. NOTE 2: Header parameters whose "Header Parameter Usage Locations" are JAdES are considered to be Header Parameters that are used only by JAdES signatures for meeting the requirements associated to achieve long-term signatures, i.e. signatures that guarantee the long-term availability and integrity of their validation material, providing therefore mechanisms for being properly validated long after their generation. This capability requires the usage of certain Header Parameters (etsiU, arcTst and others) which convert the JWS in a JAdES signature. Registry Contents: • Header Parameter Name: x5t#o • Header Parameter Description: JSON object containing a digest algorithm identifier and the base64url-encoded digest value of an object computed using the mentioned digest algorithm • Header Parameter Usage Locations: JWS / JAdES • Change Controller: European Telecommunications Standards Institute (ETSI hereinafter) Electronic Signatures and Trust Infrastructures (ESI hereinafter) Technical Committee (TC hereinafter) • Specification Document(s): Clause 5.2.2.2 of the present document • Header Parameter Name: sigX5ts • Header Parameter Description: JSON Array of x5t#o JSON Objects (each one containing a digest algorithm identifier and the base64url-encoded digest value of an object computed using the mentioned digest algorithm) • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.2.3 of the present document • Header Parameter Name: srCms • Header Parameter Description: JSON Array of JSON Objects. Each JSON Object identifies one commitment endorsed by the signer when generating the signature. It includes a unique identifier of the commitment itself. It also may contain an array of qualifiers to the commitment • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.3 of the present document ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 62 • Header Parameter Name: sigPl • Header Parameter Description: JSON Object for indicating the location where the signature was generated. It may contain an indication of the country, the locality, the region, a box number in a post office, the postal code, and the street address • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.4 of the present document • Header Parameter Name: srAts • Header Parameter Description: JSON Object that may contain: an array of attributes that the signer claims to be in possession of, an array of attribute certificates (X.509 attribute certificates or other) issued to the signer, an array of signed assertions issued by a third party to the signer, or any combination of the three aforementioned JSON arrays • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.5 of the present document • Header Parameter Name: adoTst • Header Parameter Description: JSON Object that encapsulates one or more electronic time-stamps, generated before the signature production, and whose message imprint computation input is the JWS Payload of the JAdES signature • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.6 of the present document • Header Parameter Name: sigPId • Header Parameter Description: JSON Object that contains one identifier, identifying a certain signature policy. It may contain the digest algorithm identifier and the base64url-encoded digest value of the document defining this signature policy, computed using the mentioned digest algorithm. It may contain signature policy qualifiers • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.7 of the present document ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 63 • Header Parameter Name: sigD • Header Parameter Description: JSON Object that manages the signing of one or more data objects detached from the JAdES signature. It contains one identifier, identifying the particular type of sigD parameter. It contains a JSON array of references to the signed detached data objects. It may contain a JSON Object encapsulating one digest algorithm identifier and a JSON Array with the base64url-encoded digest values of the detached data objects referenced in the pars JSON array. It may also contain a JSON Array of strings, each one identifying the commitment endorsed by the signer when signing a particular detached data object • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.2.8 of the present document • Header Parameter Name: etsiU • Header Parameter Description: JSON array that contains a number of JSON values that are placed within the array in the order they are incorporated into the JAdES signature • Header Parameter Usage Locations: JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.1 of the present document • Header Parameter Name: cSig • Header Parameter Description: JSON Object that contains a JWS signature or a JAdES signature that countersigns the JWS/JAdES signature where it is included • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.2 of the present document • Header Parameter Name: sigPSt • Header Parameter Description: JSON Object that contains either the signature policy document which is referenced in sigPId header parameter, or an URI referencing a local store the signature policy document can be retrieved • Header Parameter Usage Locations: JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.3 of the present document • Header Parameter Name: sigTst • Header Parameter Description: JSON Object that encapsulates one or more electronic time-stamps time- stamping the base64url-encoded JWS Signature • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 64 • Specification Document(s): Clause 5.3.4 of the present document • Header Parameter Name: xVals • Header Parameter Description: JSON array that may contain certificates (X.509 or other types) present in the certificate path of the JWS/JAdES signature and any countersignature that is present within the JWS/JAdES signature • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.5.2 of the present document • Header Parameter Name: rVals • Header Parameter Description: JSON array that may contain revocation data (CRLs, OCSP responses, or other) corresponding to certificates present in the certificate path of the JWS/JAdES signature and any countersignature that is present within the JWS/JAdES signature • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.5.3 of the present document • Header Parameter Name: axVals • Header Parameter Description: JSON array that contains certificates (X.509 or other types) present in the certificate path of the signer's attribute certificates or signed assertions generated by third parties and incorporated within the srAts header parameter • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.5.4 of the present document • Header Parameter Name: arVals • Header Parameter Description: JSON array that may contain revocation data (CRLs, OCSP responses, or other) corresponding to certificates present in the certificate path of the signer attribute certificates or signed assertions generated by third parties and incorporated within the srAts header parameter • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.5.5 of the present document • Header Parameter Name: anyValData • Header Parameter Description: JSON Object that may contain: a JSON array enclosing any certificate required for validating the JWS/JAdES signature, an array enclosing any revocation data (CRL, OCSP response, other revocation data) required for validating the JWS/JAdES signature, or both arrays ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 65 • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.5.6 of the present document • Header Parameter Name: tstVD • Header Parameter Description: JSON Object that may contain: an array enclosing any certificate required for validating electronic time-stamps present within the JWS/JAdES signature, an array enclosing any revocation data (CRL, OCSP response, other revocation data) required for validating the mentioned electronic time-stamps, or both arrays • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.6.1 of the present document • Header Parameter Name: arcTst • Header Parameter Description: JSON Object that encapsulates one or more electronic time-stamps time-stamping the JWS Payload, the JWS Protected Header, the JAdES Signature Value, and the contents of the etsiU JSON array within the JWS Unprotected Header at the time of generating each electronic time-stamp • Header Parameter Usage Locations: JAdES (long-term) • Change Controller: ETSI ESI TC • Specification Document(s): Clause 5.3.6.2 of the present document • Header Parameter Name: xRefs • Header Parameter Description: JSON Array that contains references to certificates present in the certificate path of the JWS/JAdES signature and any countersignature that is present. Each reference contains an identifier of a digest algorithm and the base64url-encoded digest value of the referenced certificate computed with that digest algorithm • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause A.1.1 of the present document • Header Parameter Name: rRefs • Header Parameter Description: JSON Array that contains references to revocation data (CRLs, OCSP responses, or other) corresponding to certificates present in the certificate path of the JWS/JAdES signature and any countersignature that is present. Each reference contains an identifier of a digest algorithm and the base64url-encoded digest value of the referenced revocation data computed with that digest algorithm • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause A.1.2 of the present document ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 66 • Header Parameter Name: axRefs • Header Parameter Description: JSON Array that contains references to certificates present in certificate path of the signer attribute certificates or signed assertions generated by third parties and incorporated within the srAts header parameter. Each reference contains an identifier of a digest algorithm and the base64url-encoded digest value of the referenced certificate computed with that digest algorithm • Header Parameter Usage Locations: JWS / JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause A.1.3 of the present document • Header Parameter Name: arRefs • Header Parameter Description: JSON Array that contains references to revocation data (CRLs, OCSP responses, or other) corresponding to certificates present in the certificate path of the signer attribute certificates or signed assertions generated by third parties and incorporated within the srAts header parameter. Each reference contains an identifier of a digest algorithm and the base64url-encoded digest value of the referenced revocation data computed with that digest algorithm • Header Parameter Usage Locations: JWS/JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause A.1.4 of the present document • Header Parameter Name: sigRTst • Header Parameter Description: JSON Object that encapsulates one or more electronic time-stamps time-stamping the on the base64url-encoded JWS Signature, the signature time-stamp, if present, and the JAdES components containing references to validation data • Header Parameter Usage Locations: JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause A.1.5.1 of the present document • Header Parameter Name: rfsTst • Header Parameter Description: JSON Object that encapsulates one or more electronic time-stamps time-stamping the on the signature time-stamp, if present, and the JAdES components containing references to validation data • Header Parameter Usage Locations: JAdES • Change Controller: ETSI ESI TC • Specification Document(s): Clause A.1.5.2 of the present document ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 67 Annex F (informative): Change history Date Version Information about changes January 2020 0.0.1 Version based on previous version circulated in October 2019 at ESI 68 (with a wrong TS number) after amendments of relevant parts. January 2020 0.0.2 Consolidated version for getting feedback from ETSI ESI members and liaised entities. May 2020 0.0.3 Consolidated version with changes implemented as per disposition to comments for version 0.0.2. September 2020 0.0.4 Incorporated resolutions for all the comments received for v0.0.3. November 2020 0.0.5 Incorporated resolutions for comments received for v0.0.4. September 2020 0.0.6 Incorporated resolutions for comments received for v0.0.5. They include some changes in JSON schema. New JSON schema files have been added to the package, some referring to JWS. January 2021 0.0.7 Incorporated resolutions for comments to v0.0.6 received during the Remote Consensus process. April 2023 1.1.3 Incorporated resolutions from comments raised after the first Plugtest© and the request of having a component for placing validation material (both certificates and revocation data) for validating any signature present within JAdES. April 2023 1.1.4 Minor editorial changes mostly in bulleted lists. July 2023 1.1.5 Reformulation of how to incorporate arcTst and compute the input to its message imprint computation in generation and validation. This reformulation is aligned with the formulation in XAdES. Reformulation of requirements on the content of anyValData: the former formulation could be interpreted as if both certificates and revocation data must be present. The presence of certificates and/or revocation data will depend on the contents of the rest of JAdES signature. This new reformulation makes it clear that this qualifying property must contain certificates, or revocation data, or both of them. Deletion of notes for clause 6.3 which did not actually provide new information but just repeated what it had already been said, and could be misinterpreted (former notes 6, 7, 8, 9, and 11 on incorporation of xVals, rVals, axVals, arVals, and anyValData. November 2023 1.1.6 Clause 5.3.5 JSON objects for validation data values. Added new clause 5.3.5.1 Introduction for stating that a JAdES signature may have certificates and/or revocation data in any of the JSON vslurd specified within 5.3.5. Clause 5.3.6.2.1 Semantics and syntax (of arcTst) Deleted text requiring to incorporate all the validation data for counter-signature before adding the archive time-stamp. This is not mandatory in general. It is made mandatory for B-LTA level in clause 6.3 Clause 5.3.6.2.2 Generation and incorporation of arcTst Changed the rules for the incorporation of validation material before incorporating the new arcTst as follows: For first arcTst: incorporation of validation data is now optional. For N+1th arcTst: mandatory to incorporate all missing validation data required for validating all signed data time-stamped by electronic time-stamp(s) in Nth arcTst. Validation data in any of the JSON values specified in clause 5.3.5. NOTE: noting that these requirements can be changed in the specifications of levels. Also remarks that the JAdES-B-LTA level requirements have not changed since v.1.1.1 Dropped the paragraphs discussing the details of the incorporation of validation material to each JSON Value specified in clause 5.3.5. Editorial changes for improving sentences and fixing typos. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 68 Date Version Information about changes December 2023 1.1.7 Clause 5.3.6.2.2 Generation and incorporation of arcTst Reinserted text requiring to requiring to incorporate all the validation data for any signed data object within JAdES signature before adding the archive time-stamp for keeping backwards compatibility. Unfortunately, wrong wording in one sentence. December 2023 1.1.8 As v 1.1.7 with fixed wording in clause 5.3.6.2.2. December 2023 1.1.9 As v1.1.8 with fixed Clause 5.3.6.2.1 Semantics and Syntax (of arcTst) Reinserted text requiring to incorporate all the validation data for counter-signature before adding the archive time-stamp for keeping backwards compatibility. February 2024 1.1.10 • Replacement of sigT by iat as specified in RFC 7519. • Addition of informative annex JSON Web Signature Claims Registration. • Explicit reference added to the IANA registry on digest algorithms in the clauses specifying header parameters that contain references (digests) to validation material. • In reaction to designated experts for IANA registration of header parameters, notes added to several clauses making it clear that choices of inner components of certain header parameters, or usage of some other header parameters are use-case or policy dependent. • Changes in schemas of v1.1.1: − In rfc7515.json: added "minItems": 1 in the definition of crit. − In 19182-jsonSchema.json: Removed definition of sigT. Insertion of definition of iat as an integer. Make pars member mandatory in sigD ("required": ["pars","mId"],). Definition of validationVals type. Definition of tstVD and anyValData as instances of validationVals. April 2024 1.1.11 Recommended to use iat instead of sigT, but the specification of sigT is kept in the document. April 2024 1.1.12 Version that: Recommends to include the iat header parameter before 2025-05-15T00:00:00Z and recommends not to include the sigT header parameter in new JAdES signatures. Mandates to include the iat header parameter after 2025-05-15T00:00:00Z April 2024 1.1.13 Version that fixes only editorial issues detected in v1.1.12 June 2024 1.1.14 Fixed cardinalities of srCms and adoTst in Table 1 to 0 or 1. Both are signed header parameters, and therefore members of a JSON Object (a map), and only one instance may be present there. Added notes following Table 1 mentioning that srCms can contain several commitments because it is a JSON array, and that adoTst can also have several electronic time- stamps. Changed the requirement for the contents of kid from a shall to a should in clause 5.1.4. Changed the deadline for incorporating iat from 2025-05-15T00:00:00Z to 2025-07-15T00:00:00Z, for keeping one year more or less since the publication of the specification. Incorporated answers to editHelp questions. Implemented actions as a result of editHelp requests. ETSI ETSI TS 119 182-1 V1.2.1 (2024-07) 69 History Document history V1.1.1 March 2021 Publication V1.2.1 July 2024 Publication
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
1 Scope
|
The present document specifies a set of rules that aims at defining the technical requirements for determining, taking into account the EU Member States trusted lists [i.4], whether a digital signature is fit for meeting the requirements of EU qualified electronic signatures/seals in the sense of the applicable European legislation, i.e. either Directive 1999/93/EC [i.2] or Regulation (EU) No 910/2014 [i.1].
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
2 References
| |
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https://docbox.etsi.org/Reference/. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are necessary for the application of the present document. [1] ETSI TS 119 102-1: "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation". [2] ETSI TS 119 612 (V2.1.1): "Electronic Signatures and Infrastructures (ESI); Trusted Lists". [3] ETSI TS 119 172-1: "Electronic Signatures and Infrastructures (ESI); Signature Policies; Part 1: Building blocks and table of contents for human readable signature policy documents". [4] ETSI EN 319 122-1: "Electronic Signatures and Infrastructures (ESI); CAdES digital signatures; Part 1: Building blocks and CAdES baseline signatures". [5] ETSI EN 319 132-1: "Electronic Signatures and Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures". [6] ETSI EN 319 142-1: "Electronic Signatures and Infrastructures (ESI); PAdES digital signatures; Part 1: Building blocks and PAdES baseline signatures". [7] ETSI TS 103 171: "Electronic Signatures and Infrastructures (ESI); XAdES Baseline Profile". [8] ETSI TS 103 172: "Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile". [9] ETSI TS 103 173: "Electronic Signatures and Infrastructures (ESI); CAdES Baseline Profile". [10] ETSI TS 103 174: "Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile". [11] IETF RFC 3161: "Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)". [12] ETSI TS 119 615: "Electronic Signatures and Infrastructures (ESI); Trusted lists; Procedures for using and interpreting European Union Member States national trusted lists". ETSI ETSI TS 119 172-4 V1.1.1 (2021-05) 7
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. [i.2] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. [i.3] ETSI TR 119 001: "Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures; Definitions and abbreviations". [i.4] Commission Implementing Decision (EU) 2015/1505 of 8 September 2015 laying down technical specifications and formats relating to trusted lists pursuant to Article 22(5) of Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market. [i.5] Commission Implementing Decision (EU) 2015/1506 of 8 September 2015 laying down specifications relating to formats of advanced electronic signatures and advanced seals to be recognised by public sector bodies pursuant to Articles 27(5) and 37(5) of Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market. [i.6] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". [i.7] ETSI TS 119 101: "Electronic Signatures and Infrastructures (ESI); Policy and security requirements for applications for signature creation and signature validation". [i.8] ETSI TS 119 102-2: "Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 2: Signature Validation Report". [i.9] ETSI TS 119 441: "Electronic Signatures and Infrastructures (ESI); Policy requirements for TSP providing signature validation services". [i.10] ETSI TS 119 511: "Electronic Signatures and Infrastructures (ESI); Policy and security requirements for trust service providers providing long-term preservation of digital signatures or general data using digital signature techniques". 3 Definition of terms, symbols, abbreviations and notations
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
3.1 Terms
|
For the purposes of the present document, the terms given in ETSI TS 119 441 [i.9] apply.
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
3.2 Symbols
|
Void. ETSI ETSI TS 119 172-4 V1.1.1 (2021-05) 8
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
3.3 Abbreviations
|
For the purposes of the present document, the abbreviations given in ETSI TR 119 001 [i.3] and the following apply: CRL Certificate Revocation List EU European Union EUMS EU Member State OCSP Online Certificate Status Protocol OID Object IDentifier QES Qualified Electronic Signatures/seals QSCD Qualified Signature/seal Creation Device TARC Technical Applicability (Rules) Checking TL Trusted List
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
3.4 Notations
|
The requirements in the present document are identified as follows: <REQ> - <the clause number> - <2-digit number - incremental> The management of the requirement identifiers for subsequent editions of the present document is as follows: • When a requirement is inserted at the end of a clause, the 2-digit number above is incremented to the next available digit. • When a requirement is inserted between two existing requirements, capital letters appended to the previous requirement identifier are used to distinguish new requirements. • The requirement identifier for deleted requirements are kept and completed with "VOID". • The requirement identifier for modified requirement are kept void and the modified requirement is identified by capital letter(s) appended to the initial requirement number. 4 Signature applicability rules for the validation of EU qualified electronic signatures/seals
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
4.1 Introduction
|
The requirements defined by the present document are organised in terms of: a) Requirements on the validation constraints and validation procedures in the sense of ETSI TS 119 102-1 [1]. b) Requirements on signature validation and applicability rules checking practices. c) Requirements on the process of checking technical applicability (rules). d) Requirements on reporting the results of the applicability rules checking.
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
4.2 Validation constraints and validation procedures
|
REQ-4.2-01: The driving application or the signature validation application shall follow the validation process, as specified in ETSI TS 119 102-1 [1], clause 5.1.2 and shall support the Validation process for Signatures providing Long Term Availability and Integrity of Validation Material. REQ-4.2-02: The present document gives the minimum requirements for QES as in the Regulation: a) The validation service may use additional inputs or additional requirements. ETSI ETSI TS 119 172-4 V1.1.1 (2021-05) 9 b) If additional inputs and/or requirements are used, they shall be clearly indicated in the applicability rules checking report. REQ-4.2-03: The constraints to be used as input to the validation process referred to in REQ-4.2-01 shall be as follows: X.509 validation constraints a) The SetOfTrustAnchors constraint defined in ETSI TS 119 172-1 [3], clause A.4.2.1, table A.2 rows (m)1.1 shall be set to the relevant information from the 'Service digital identity' field(s) from the SI-Results output of the procedure specified in clause 4.3 of ETSI TS 119 615 [12], considering as input: i) the signing certificate, as successfully identified as per the execution of clause 5.2.3 of ETSI TS 119 102-1 [1] as part of step 2 of clause 5.3.4 of [1]; ii) the value http://uri.etsi.org/TrstSvc/Svctype/CA/QC for the TLS-Sti Service type identifier; and iii) the NotBeforeDate value of the signing certificate for the Date-time indication. NOTE 1: The use of the NotBeforeDate value of the signing certificate here above is expected to identify the date at which the certificate has been issued as a valid (qualified) certificate, even if technically it can have been created before that date. NOTE 2: The validation of any time-stamp does not require that the corresponding trust anchor is defined as a time- stamping generation service within an EU Member State national TL. See also REQ-4.5-01.d).ii). b) Constraints defined in ETSI TS 119 172-1 [3], clause A.4.2.1, table A.2 rows (m)1.2 to (m)1.10 shall not be used. c) With regards to revocation constraints: i) The RevocationCheckingConstraints shall be set to "eitherCheck" as defined in ETSI TS 119 172-1 [3], clause A.4.2.1, table A.2 rows (m)2.1. ii) The RevocationFreshnessConstraints defined in ETSI TS 119 172-1 [3], clause A.4.2.1, table A.2 rows (m)2.2 shall be used with a maximum value of 0, ensuring that the revocation information is only accepted if it has been issued after the best signature time. iii) Constraint defined in ETSI TS 119 172-1 [3], clause A.4.2.1, table A.2 rows (m)2.3 and (m).3 shall not be used. NOTE 3: ETSI standards and referenced IETF RFCs only support the concept of "certificate suspension without memory", meaning that when a certificate is suspended it is considered as having an indeterminate validity status (waiting for next status change to occur, if any), and once unsuspended it is considered as having been valid during the period for which it was previously suspended. Cryptographic constraints NOTE 4: Guidance on cryptographic algorithms validity can be found in ETSI TS 119 312 [i.6]. d) The cryptographic verification process specified in ETSI TS 119 102-1 [1] shall enable the validation procedure to report the relying party with information related to cryptographic suites used to generate the signature being validated and potential security related issues against either national rules or ETSI TS 119 312 [i.6], indicating clearly which of the national rules or ETSI TS 119 312 [i.6] has been used to express potential security issues. e) When the signature validation application is not able to deal with a specific algorithm or cryptographic suite, it shall not invalidate the signature for that reason but lead to an INDETERMINATE result and raise a warning indicating the concerned cryptographic suite and the fact it is not supported. Signature elements constraints f) Failure to comply with one of the signature formats identified in REQ-4.3-01 shall not result in invalidating the signature but in a warning indicating such a failure and the reasons for such a failure. ETSI ETSI TS 119 172-4 V1.1.1 (2021-05) 10 4.3 Requirements on signature validation and applicability rules checking practices NOTE 1: The requirements of the present clause refer to the practices whose related statements are referred to ETSI TS 119 172-1 [3], clause A.2. REQ-4.3-01: The signature validation application should support signature formats compliant with: a) ETSI TS 103 171 [7]; b) ETSI TS 103 172 [8]; c) ETSI TS 103 173 [9]; d) ETSI TS 103 174 [10]; and e) ETSI standards on baseline profiles for CAdES digital signatures (ETSI EN 319 122-1 [4]), XAdES digital signatures (ETSI EN 319 132-1 [5]), and PAdES digital signatures (ETSI EN 319 142-1 [6]). NOTE 2: This aims to support CID (EU) 2015/1506 [i.5]. REQ-4.3-02: Signature validation applications should be compliant with ETSI TS 119 101 [i.7]. REQ-4.3-03: When provided as a service, the validation and applicability rules checking processes should be provided in compliance with ETSI TS 119 441 [i.9]. REQ-4.3-04: Relying parties shall be provided with unambiguous information with regards to any security relevant issue identified by the signature validation and applicability rules checking processes. REQ-4.3-05: Relying parties shall be provided with procedures and facilities to validate the signatures and obtain validation and applicability rules checking results data. REQ-4.3-06: Relying parties shall be provided with procedures and facilities allowing them to identify the relevance of further actions to be taken when the preservation of signed data and associated signatures is required. NOTE 3: Guidance on preservation of signed data and associated signatures can be found in ETSI TS 119 511 [i.10].
|
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
4.4 Technical applicability (rules) checking process
| |
919a4abd59c4c16afae8a6ec97f9761a
|
119 172-4
|
4.4.1 Overview
|
The present clause defines a process for implementing technical applicability (rules) checks aiming to facilitate the determination whether a digital signature can be considered technically suitable to implement EU qualified electronic signatures/seals using trusted lists in the sense of the applicable European legislation at the time of signing, i.e. either Directive 1999/93/EC [i.2] or Regulation (EU) No 910/2014 [i.1]. This process aims to support the "validation" process referred to in Article 32(1) of Regulation (EU) No 910/2014 [i.1]. The inputs of this process are the outputs of the process performed as specified in clause 4.2 of the present document and the main output is a status indicating the technical suitability of the digital signature to implement an EU qualified electronic signature or seal in the sense of Article 32 of Regulation (EU) No 910/2014 [i.1].
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.