Internet-Draft | CoSWID | July 2022 |
Birkholz, et al. | Expires 20 January 2023 | [Page] |
ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and installation bundles. SWID tag representations can be too large for devices with network and storage constraints. This document defines a concise representation of SWID tags: Concise SWID (CoSWID) tags. CoSWID supports a similar set of semantics and features as SWID tags, as well as new semantics that allow CoSWIDs to describe additional types of information, all in a more memory efficient format.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 20 January 2023.¶
Copyright (c) 2022 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
SWID tags, as defined in ISO-19770-2:2015 [SWID], provide a standardized XML-based record format that identifies and describes a specific release of software, a patch, or an installation bundle, which are referred to as software components in this document. Different software components, and even different releases of a particular software component, each have a different SWID tag record associated with them. SWID tags are meant to be flexible and able to express a broad set of metadata about a software component.¶
SWID tags are used to support a number of processes including but not limited to:¶
While there are very few required fields in SWID tags, there are many optional fields that support different uses. A SWID tag consisting of only required fields might be a few hundred bytes in size; however, a tag containing many of the optional fields can be many orders of magnitude larger. Thus, real-world instances of SWID tags can be fairly large, and the communication of SWID tags in usage scenarios, such as those described earlier, can cause a large amount of data to be transported. This can be larger than acceptable for constrained devices and networks. Concise SWID (CoSWID) tags significantly reduce the amount of data transported as compared to a typical SWID tag through the use of the Concise Binary Object Representation (CBOR) [RFC8949].¶
Size comparisons between XML SWID and CoSWID mainly depend on domain-specific applications and the complexity of attributes used in instances. While the values stored in CoSWID are often unchanged and therefore not reduced in size compared to an XML SWID, the scaffolding that the CoSWID encoding represents is significantly smaller by taking up 10 percent or less in size. This effect is visible in representation sizes, which in early experiments benefited from a 50 percent to 85 percent reduction in generic usage scenarios. Additional size reduction is enabled with respect to the memory footprint of XML parsing/validation.¶
In a CoSWID, the human-readable labels of SWID data items are replaced with more concise integer labels (indices). This approach allows SWID and CoSWID to share a common implicit information model, with CoSWID providing an alternate data model [RFC3444]. While SWID and CoSWID are intended to share the same implicit information model, this specification does not define this information model, or a mapping between the two data formats. While an attempt to align SWID and CoSWID tags has been made here, future revisions of ISO/IEC 19770-2:2015 or this specification might cause this implicit information model to diverge, since these specifications are maintained by different standards groups.¶
The use of CBOR to express SWID information in CoSWID tags allows both CoSWID and SWID tags to be part of an enterprise security solution for a wider range of endpoints and environments.¶
In addition to defining the format of a SWID tag record, ISO/IEC 19770-2:2015 defines requirements concerning the SWID tag lifecycle. Specifically, when a software component is installed on an endpoint, that software component's SWID tag is also installed. Likewise, when the software component is uninstalled or replaced, the SWID tag is deleted or replaced, as appropriate. As a result, ISO/IEC 19770-2:2015 describes a system wherein there is a correspondence between the set of installed software components on an endpoint, and the presence of the corresponding SWID tags for these components on that endpoint. CoSWIDs share the same lifecycle requirements as a SWID tag.¶
The SWID specification and supporting guidance provided in NIST Internal Report (NISTIR) 8060: Guidelines for the Creation of Interoperable SWID Tags [SWID-GUIDANCE] defines four types of SWID tags: primary, patch, corpus, and supplemental. The following text is paraphrased from these sources.¶
The type of a tag is determined by specific data elements, which are discussed in Section 3, which also provides normative language for CoSWID semantics that implement this lifecycle. The following information helps to explain how these semantics apply to use of a CoSWID tag.¶
Corpus, primary, and patch tags have similar functions in that they describe the existence and/or presence of different types of software components (e.g., software installers, software installations, software patches), and, potentially, different states of these software components. Supplemental tags have the same structure as other tags, but are used to provide information not contained in the referenced corpus, primary, and patch tags. All four tag types come into play at various points in the software lifecycle and support software management processes that depend on the ability to accurately determine where each software component is in its lifecycle.¶
Figure 1 illustrates the steps in the software lifecycle and the relationships among those lifecycle events supported by the four types of SWID and CoSWID tags. A detailed description of the four tags types is provided in Section 2.3. The figure identifies the types of tags that are used in each lifecycle event.¶
There are many ways in which software tags might be managed for the host the software is installed on. For example, software tags could be made available on the host or to an external software manager when storage is limited on the host.¶
In these cases the host or external software manager is responsible for management of the tags, including deployment and removal of the tags as indicated by the above lifecycle. Tags are deployed and previously deployed tags that are typically removed (indicated by an "x" prefix) at each lifecycle stage, as follows:¶
Corpus tags are not actually deployed on the target system but are intended to support deployment procedures and their dependencies at install-time, such as to verify the installation media.¶
Note: In the context of software tagging software patching and updating differ in an important way. When installing a patch, a set of file modifications are made to pre-installed software which do not alter the version number or the descriptive metadata of an installed software component. An update can also make a set of file modifications, but the version number or the descriptive metadata of an installed software component are changed.¶
As illustrated in the figure, supplemental tags can be associated with any corpus, primary, or patch tag to provide additional metadata about an installer, installed software, or installed patch respectively.¶
Understanding the use of CoSWIDs in the software lifecycle provides a basis for understanding the information provided in a CoSWID and the associated semantics of this information. Each of the different SWID and CoSWID tag types provide different sets of information. For example, a "corpus tag" is used to describe a software component's installation image on an installation media, while a "patch tag" is meant to describe a patch that modifies some other software component.¶
This document defines the CoSWID tag format, which is based on CBOR. CBOR-based CoSWID tags offer a more concise representation of SWID information as compared to the XML-based SWID tag representation in ISO-19770-2:2015. The structure of a CoSWID is described via the Concise Data Definition Language (CDDL) [RFC8610]. The resulting CoSWID data definition is aligned to the information able to be expressed with the XML schema definition of ISO-19770-2:2015 [SWID]. This alignment allows both SWID and CoSWID tags to represent a common set of software component information and allows CoSWID tags to support the same uses as a SWID tag.¶
The vocabulary, i.e., the CDDL names of the types and members used in the CoSWID CDDL specification, are mapped to more concise labels represented as small integer values (indices). The names used in the CDDL specification and the mapping to the CBOR representation using integer indices is based on the vocabulary of the XML attribute and element names defined in ISO/IEC 19770-2:2015.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The following describes the general rules and processes for encoding data using CDDL representation. Prior familiarity with CBOR and CDDL concepts will be helpful in understanding this CoSWID specification.¶
This section describes the conventions by which a CoSWID is represented in the CDDL structure. The CamelCase [CamelCase] notation used in the XML schema definition is changed to a hyphen-separated notation [KebabCase] (e.g., ResourceCollection is named resource-collection) in the CoSWID CDDL specification. This deviation from the original notation used in the XML representation reduces ambiguity when referencing certain attributes in corresponding textual descriptions. An attribute referred to by its name in CamelCase notation explicitly relates to XML SWID tags; an attribute referred to by its name in KebabCase notation explicitly relates to CBOR CoSWID tags. This approach simplifies the composition of further work that reference both XML SWID and CBOR CoSWID documents.¶
In most cases, mapping attribute names between SWID and CoSWID can be done automatically by converting between CamelCase and KebabCase attribute names. However, some CoSWID CDDL attribute names show greater variation relative to their corresponding SWID XML Schema attributes. This is done when the change improves clarity in the CoSWID specification. For example, the "name" and "version" SWID fields corresponds to the "software-name" and "software-version" CoSWID fields, respectively. As such, it is not always possible to mechanically translate between corresponding attribute names in the two formats. In such cases, a manual mapping will need to be used. XPath expressions [W3C.REC-xpath20-20101214] need to use SWID names, see Section 5.2.¶
The 57 human-readable text labels of the CDDL-based CoSWID vocabulary are mapped to integer indices via a block of rules at the bottom of the definition. This allows a more concise integer-based form to be stored or transported, as compared to the less efficient text-based form of the original vocabulary.¶
Through use of CDDL-based integer labels, CoSWID allows for future expansion in subsequent revisions of this specification and through extensions (see Section 2.2). New constructs can be associated with a new integer index. A deprecated construct can be replaced by a new construct with a new integer index. An implementation can use these integer indexes to identify the construct to parse. The CoSWID Items registry, defined in Section 6.1, is used to ensure that new constructs are assigned a unique index value. This approach avoids the need to have an explicit CoSWID version.¶
In a number of places, the value encoding admits both integer values and text strings. The integer values are defined in a registry specific to the kind of value; the text values are not intended for interchange and exclusively meant for private use as defined in Section 6.2.2. Encoders SHOULD NOT use string values based on the names registered in the registry, as these values are less concise than their index value equivalent; a decoder MUST however be prepared to accept text strings that are not specified in this document (and ignore the construct if that string is unknown). In the rest of the document, we call this an "integer label with text escape".¶
The root of the CDDL specification provided by this document is the
rule coswid
(as defined in Section 8):¶
start = coswid¶
In CBOR, an array is encoded using bytes that identify the array, and the array's length or stop point (see [RFC8949]). To make items that support 1 or more values, the following CDDL notation is used.¶
_name_ = (_label_ => _data_ / [ 2* _data_ ])¶
The CDDL rule above allows either a single data item or an array of 2 or more data values to be provided. When a singleton data value is provided, the CBOR markers for the array, array length, and stop point are not needed, saving bytes. When two or more data values are provided, these values are encoded as an array. This modeling pattern is used frequently in the CoSWID CDDL specification to allow for more efficient encoding of singleton values.¶
Usage of this construct can be simplified using¶
one-or-more<T> = T / [ 2* T ]¶
simplifying the above example to¶
_name_ = (_label_ => one-or-more<_data_>)¶
The following subsections describe the different parts of the CoSWID model.¶
The CDDL "text" type is represented in CBOR as a major type 3, which represents "a string of Unicode characters that [are] encoded as UTF-8 [RFC3629]" (see Section 3.1 of [RFC8949]). Thus both SWID and CoSWID use UTF-8 for the encoding of characters in text strings.¶
To ensure that UTF-8 character strings are able to be encoded/decoded and exchanged interoperably, text strings in CoSWID MUST be encoded consistent with the Net-Unicode definition defined in [RFC5198].¶
All names registered with IANA according to requirements in Section 6.2 also MUST be valid according to the XML Schema NMTOKEN data type (see [W3C.REC-xmlschema-2-20041028], Section 3.3.4) to ensure compatibility with the SWID specification where these names are used.¶
The CoSWID specification contains two features that are not included in the SWID specification on which it is based. These features are:¶
The following CDDL sockets (extension points) are defined in this document, which allow the addition of new information structures to their respective CDDL groups.¶
Map Name | CDDL Socket | Defined in |
---|---|---|
concise-swid-tag | $$coswid-extension | Section 2.3 |
entity-entry | $$entity-extension | Section 2.6 |
link-entry | $$link-extension | Section 2.7 |
software-meta-entry | $$software-meta-extension | Section 2.8 |
resource-collection | $$resource-collection-extension | Section 2.9.2 |
file-entry | $$file-extension | Section 2.9.2 |
directory-entry | $$directory-extension | Section 2.9.2 |
process-entry | $$process-extension | Section 2.9.2 |
resource-entry | $$resource-extension | Section 2.9.2 |
payload-entry | $$payload-extension | Section 2.9.3 |
evidence-entry | $$evidence-extension | Section 2.9.4 |
The CoSWID Items Registry defined in Section 6.1 provides a registration mechanism allowing new items, and their associated index values, to be added to the CoSWID model through the use of the CDDL sockets described in the table above. This registration mechanism provides for well-known index values for data items in CoSWID extensions, allowing these index values to be recognized by implementations supporting a given extension.¶
The following additional CDDL sockets are defined in this document to allow for adding new values to corresponding type-choices (i.e. to represent enumerations) via custom CDDL specifications.¶
Enumeration Name | CDDL Socket | Defined in |
---|---|---|
version-scheme | $version-scheme | Section 4.1 |
role | $role | Section 4.2 |
ownership | $ownership | Section 4.3 |
rel | $rel | Section 4.4 |
use | $use | Section 4.5 |
A number of CoSWID value registries are also defined in Section 6.2 that allow new values to be registered with IANA for the enumerations above. This registration mechanism supports the definition of new well-known index values and names for new enumeration values used by CoSWID, which can also be used by other software tagging specifications. This registration mechanism allows new standardized enumerated values to be shared between multiple tagging specifications (and associated implementations) over time.¶
The CDDL specification for the root concise-swid-tag map is as follows and this rule and its constraints MUST be followed when creating or validating a CoSWID tag:¶
concise-swid-tag = { tag-id => text / bstr .size 16, tag-version => integer, ? corpus => bool, ? patch => bool, ? supplemental => bool, software-name => text, ? software-version => text, ? version-scheme => $version-scheme, ? media => text, ? software-meta => one-or-more<software-meta-entry>, entity => one-or-more<entity-entry>, ? link => one-or-more<link-entry>, ? payload-or-evidence, * $$coswid-extension, global-attributes, } payload-or-evidence //= ( payload => payload-entry ) payload-or-evidence //= ( evidence => evidence-entry ) tag-id = 0 software-name = 1 entity = 2 evidence = 3 link = 4 software-meta = 5 payload = 6 corpus = 8 patch = 9 media = 10 supplemental = 11 tag-version = 12 software-version = 13 version-scheme = 14 $version-scheme /= multipartnumeric $version-scheme /= multipartnumeric-suffix $version-scheme /= alphanumeric $version-scheme /= decimal $version-scheme /= semver $version-scheme /= int / text multipartnumeric = 1 multipartnumeric-suffix = 2 alphanumeric = 3 decimal = 4 semver = 16384¶
The following describes each member of the concise-swid-tag root map.¶
The following co-constraints apply to the information provided in the concise-swid-tag group.¶
The global-attributes group provides a list of items, including an optional language definition to support the processing of text-string values, and an unbounded set of any-attribute items allowing for additional items to be provided as a general point of extension in the model.¶
The CDDL for the global-attributes follows:¶
global-attributes = ( ? lang => text, * any-attribute, ) any-attribute = ( label => one-or-more<text> / one-or-more<int> ) label = text / int¶
The following describes each child item of this group.¶
The CDDL for the entity-entry map follows:¶
entity-entry = { entity-name => text, ? reg-id => any-uri, role => one-or-more<$role>, ? thumbprint => hash-entry, * $$entity-extension, global-attributes, } entity-name = 31 reg-id = 32 role = 33 thumbprint = 34 $role /= tag-creator $role /= software-creator $role /= aggregator $role /= distributor $role /= licensor $role /= maintainer $role /= int / text tag-creator=1 software-creator=2 aggregator=3 distributor=4 licensor=5 maintainer=6¶
The following describes each child item of this group.¶
role (index 33): An integer or textual value (integer label with text escape, see Section 2) representing the relationship(s) between the entity, and this tag or the referenced software component. If an integer value is used it MUST be an index value in the range -256 to 255. Integer values in the range -256 to -1 are reserved for testing and use in closed environments (see Section 6.2.2). Integer values in the range 0 to 255 correspond to registered entries in the IANA "Software ID Entity Role Values" registry (see Section 6.2.5).¶
The following additional requirements exist for the use of the "role" item:¶
The CDDL for the link-entry map follows:¶
link-entry = { ? artifact => text, href => any-uri, ? media => text, ? ownership => $ownership, rel => $rel, ? media-type => text, ? use => $use, * $$link-extension, global-attributes, } media = 10 artifact = 37 href = 38 ownership = 39 rel = 40 media-type = 41 use = 42 $ownership /= shared $ownership /= private $ownership /= abandon $ownership /= int / text abandon=1 private=2 shared=3 $rel /= ancestor $rel /= component $rel /= feature $rel /= installationmedia $rel /= packageinstaller $rel /= parent $rel /= patches $rel /= requires $rel /= see-also $rel /= supersedes $rel /= supplemental $rel /= -356..65536 / text ancestor=1 component=2 feature=3 installationmedia=4 packageinstaller=5 parent=6 patches=7 requires=8 see-also=9 supersedes=10 supplemental=11 $use /= optional $use /= required $use /= recommended $use /= int / text optional=1 required=2 recommended=3¶
The following describes each member of this map.¶
href (index 38): A URI-reference [RFC3986] for the referenced resource. The "href" item's value can be, but is not limited to, the following (which is a slightly modified excerpt from [SWID]):¶
The CDDL for the software-meta-entry map follows:¶
software-meta-entry = { ? activation-status => text, ? channel-type => text, ? colloquial-version => text, ? description => text, ? edition => text, ? entitlement-data-required => bool, ? entitlement-key => text, ? generator => text / bstr .size 16, ? persistent-id => text, ? product => text, ? product-family => text, ? revision => text, ? summary => text, ? unspsc-code => text, ? unspsc-version => text, * $$software-meta-extension, global-attributes, } activation-status = 43 channel-type = 44 colloquial-version = 45 description = 46 edition = 47 entitlement-data-required = 48 entitlement-key = 49 generator = 50 persistent-id = 51 product = 52 product-family = 53 revision = 54 summary = 55 unspsc-code = 56 unspsc-version = 57¶
The following describes each child item of this group.¶
CoSWID adds explicit support for the representation of hash entries using algorithms that are registered in the IANA "Named Information Hash Algorithm Registry" [IANA.named-information] using the hash member (index 7) and the corresponding hash-entry type. This is the equivalent of the namespace qualified "hash" attribute in [SWID].¶
hash-entry = [ hash-alg-id: int, hash-value: bytes, ]¶
The number used as a value for hash-alg-id is an integer-based hash algorithm identifier who's value MUST refer to an ID in the IANA "Named Information Hash Algorithm Registry" [IANA.named-information] with a Status of "current" (at the time the generator software was built or later); other hash algorithms MUST NOT be used. If the hash-alg-id is not known, then the integer value "0" MUST be used. This allows for conversion from ISO SWID tags [SWID], which do not allow an algorithm to be identified for this field.¶
The hash-value MUST represent the raw hash value as a byte string (as opposed to, e.g., base64 encoded) generated from the representation of the resource using the hash algorithm indicated by hash-alg-id.¶
A list of items both used in evidence (created by a software discovery process) and payload (installed in an endpoint) content of a CoSWID tag document to structure and differentiate the content of specific CoSWID tag types. Potential content includes directories, files, processes, or resources.¶
The CDDL for the resource-collection group follows:¶
path-elements-group = ( ? directory => one-or-more<directory-entry>, ? file => one-or-more<file-entry>, ) resource-collection = ( path-elements-group, ? process => one-or-more<process-entry>, ? resource => one-or-more<resource-entry>, * $$resource-collection-extension, ) filesystem-item = ( ? key => bool, ? location => text, fs-name => text, ? root => text, ) file-entry = { filesystem-item, ? size => uint, ? file-version => text, ? hash => hash-entry, * $$file-extension, global-attributes, } directory-entry = { filesystem-item, ? path-elements => { path-elements-group }, * $$directory-extension, global-attributes, } process-entry = { process-name => text, ? pid => integer, * $$process-extension, global-attributes, } resource-entry = { type => text, * $$resource-extension, global-attributes, } directory = 16 file = 17 process = 18 resource = 19 size = 20 file-version = 21 key = 22 location = 23 fs-name = 24 root = 25 path-elements = 26 process-name = 27 pid = 28 type = 29¶
The following describes each member of the groups and maps illustrated above.¶
The CDDL for the payload-entry map follows:¶
payload-entry = { resource-collection, * $$payload-extension, global-attributes, }¶
The following describes each child item of this group.¶
The CDDL for the evidence-entry map follows:¶
evidence-entry = { resource-collection, ? date => integer-time, ? device-id => text, ? location => text, * $$evidence-extension, global-attributes, } date = 35 device-id = 36¶
The following describes each child item of this group.¶
In order to create a valid CoSWID document the structure of the corresponding CBOR message MUST adhere to the following CDDL specification.¶
<CODE BEGINS> concise-swid-tag = { tag-id => text / bstr .size 16, tag-version => integer, ? corpus => bool, ? patch => bool, ? supplemental => bool, software-name => text, ? software-version => text, ? version-scheme => $version-scheme, ? media => text, ? software-meta => one-or-more<software-meta-entry>, entity => one-or-more<entity-entry>, ? link => one-or-more<link-entry>, ? payload-or-evidence, * $$coswid-extension, global-attributes, } payload-or-evidence //= ( payload => payload-entry ) payload-or-evidence //= ( evidence => evidence-entry ) any-uri = uri label = text / int $version-scheme /= multipartnumeric $version-scheme /= multipartnumeric-suffix $version-scheme /= alphanumeric $version-scheme /= decimal $version-scheme /= semver $version-scheme /= int / text any-attribute = ( label => one-or-more<text> / one-or-more<int> ) one-or-more<T> = T / [ 2* T ] global-attributes = ( ? lang => text, * any-attribute, ) hash-entry = [ hash-alg-id: int, hash-value: bytes, ] entity-entry = { entity-name => text, ? reg-id => any-uri, role => one-or-more<$role>, ? thumbprint => hash-entry, * $$entity-extension, global-attributes, } $role /= tag-creator $role /= software-creator $role /= aggregator $role /= distributor $role /= licensor $role /= maintainer $role /= int / text link-entry = { ? artifact => text, href => any-uri, ? media => text, ? ownership => $ownership, rel => $rel, ? media-type => text, ? use => $use, * $$link-extension, global-attributes, } $ownership /= shared $ownership /= private $ownership /= abandon $ownership /= int / text $rel /= ancestor $rel /= component $rel /= feature $rel /= installationmedia $rel /= packageinstaller $rel /= parent $rel /= patches $rel /= requires $rel /= see-also $rel /= supersedes $rel /= supplemental $rel /= -256..64436 / text $use /= optional $use /= required $use /= recommended $use /= int / text software-meta-entry = { ? activation-status => text, ? channel-type => text, ? colloquial-version => text, ? description => text, ? edition => text, ? entitlement-data-required => bool, ? entitlement-key => text, ? generator => text / bstr .size 16, ? persistent-id => text, ? product => text, ? product-family => text, ? revision => text, ? summary => text, ? unspsc-code => text, ? unspsc-version => text, * $$software-meta-extension, global-attributes, } path-elements-group = ( ? directory => one-or-more<directory-entry>, ? file => one-or-more<file-entry>, ) resource-collection = ( path-elements-group, ? process => one-or-more<process-entry>, ? resource => one-or-more<resource-entry>, * $$resource-collection-extension, ) file-entry = { filesystem-item, ? size => uint, ? file-version => text, ? hash => hash-entry, * $$file-extension, global-attributes, } directory-entry = { filesystem-item, ? path-elements => { path-elements-group }, * $$directory-extension, global-attributes, } process-entry = { process-name => text, ? pid => integer, * $$process-extension, global-attributes, } resource-entry = { type => text, * $$resource-extension, global-attributes, } filesystem-item = ( ? key => bool, ? location => text, fs-name => text, ? root => text, ) payload-entry = { resource-collection, * $$payload-extension, global-attributes, } evidence-entry = { resource-collection, ? date => integer-time, ? device-id => text, ? location => text, * $$evidence-extension, global-attributes, } integer-time = #6.1(int) ; "global map member" integer indexes tag-id = 0 software-name = 1 entity = 2 evidence = 3 link = 4 software-meta = 5 payload = 6 hash = 7 corpus = 8 patch = 9 media = 10 supplemental = 11 tag-version = 12 software-version = 13 version-scheme = 14 lang = 15 directory = 16 file = 17 process = 18 resource = 19 size = 20 file-version = 21 key = 22 location = 23 fs-name = 24 root = 25 path-elements = 26 process-name = 27 pid = 28 type = 29 entity-name = 31 reg-id = 32 role = 33 thumbprint = 34 date = 35 device-id = 36 artifact = 37 href = 38 ownership = 39 rel = 40 media-type = 41 use = 42 activation-status = 43 channel-type = 44 colloquial-version = 45 description = 46 edition = 47 entitlement-data-required = 48 entitlement-key = 49 generator = 50 persistent-id = 51 product = 52 product-family = 53 revision = 54 summary = 55 unspsc-code = 56 unspsc-version = 57 ; "version-scheme" integer indexes multipartnumeric = 1 multipartnumeric-suffix = 2 alphanumeric = 3 decimal = 4 semver = 16384 ; "role" integer indexes tag-creator=1 software-creator=2 aggregator=3 distributor=4 licensor=5 maintainer=6 ; "ownership" integer indexes abandon=1 private=2 shared=3 ; "rel" integer indexes ancestor=1 component=2 feature=3 installationmedia=4 packageinstaller=5 parent=6 patches=7 requires=8 see-also=9 supersedes=10 ; supplemental=11 ; this is already defined earlier ; "use" integer indexes optional=1 required=2 recommended=3 <CODE ENDS>¶
The operational model for SWID and CoSWID tags was introduced in Section 1.1, which described four different CoSWID tag types. The following additional rules apply to the use of CoSWID tags to ensure that created tags properly identify the tag type.¶
The first matching rule MUST determine the type of the CoSWID tag.¶
Note: Multiple of the corpus, patch, and supplemental items can have values set as "true". The rules above provide a means to determine the tag's type in such a case. For example, a SWID or CoSWID tag for a patch installer might have both corpus and patch items set to "true". In such a case, the tag is a "Corpus Tag". The tag installed by this installer would have only the patch item set to "true", making the installed tag type a "Patch Tag".¶
This section defines a number of kinds of indexed label values that are maintained in a registry each (Section 6). These values are represented as positive integers. In each registry, the value 0 is marked as Reserved.¶
The following table contains a set of values for use in the concise-swid-tag group's version-scheme item. Version Scheme Name strings match the version schemes defined in the ISO/IEC 19770-2:2015 [SWID] specification. Index value indicates the value to use as the version-scheme item's value. The Version Scheme Name provides human-readable text for the value. The Definition describes the syntax of allowed values for each entry.¶
Index | Version Scheme Name | Definition |
---|---|---|
1 | multipartnumeric | Numbers separated by dots, where the numbers are interpreted as decimal integers (e.g., 1.2.3, 1.2.3.4.5.6.7, 1.4.5, 1.21) |
2 | multipartnumeric+suffix | Numbers separated by dots, where the numbers are interpreted as decimal integers with an additional textual suffix (e.g., 1.2.3a) |
3 | alphanumeric | Strictly a string, no interpretation as number |
4 | decimal | A single decimal floating point number |
16384 | semver | A semantic version as defined by [SWID]. Also see the [SEMVER] specification for more information |
multipartnumeric and the numbers part of multipartnumeric+suffix are interpreted as a sequence of numbers and are sorted in lexicographical order by these numbers (i.e., not by the digits in the numbers) and then the textual suffix (for multipartnumeric+suffix). Alphanumeric strings are sorted lexicographically as character strings. Decimal version numbers are interpreted as a single floating point number (e.g., 1.25 is less than 1.3).¶
The values above are registered in the IANA "Software ID Version Scheme Values" registry defined in Section 6.2.4. Additional entries will likely be registered over time in this registry.¶
A CoSWID producer that is aware of the version scheme that has been used to select the version value, SHOULD include the optional version-scheme item to avoid semantic ambiguity. If the CoSWID producer does not have this information, it SHOULD omit the version-scheme item. The following heuristics can be used by a CoSWID consumer, based on the version schemes' partially overlapping value spaces:¶
Note that these heuristics are imperfect and can guess wrong, which is the reason the version-scheme item SHOULD be included by the producer.¶
The following table indicates the index value to use for the entity-entry group's role item (see Section 2.6). These values match the entity roles defined in the ISO/IEC 19770-2:2015 [SWID] specification. The "Index" value indicates the value to use as the role item's value. The "Role Name" provides human-readable text for the value. The "Definition" describes the semantic meaning of each entry.¶
Index | Role Name | Definition |
---|---|---|
1 | tagCreator | The person or organization that created the containing SWID or CoSWID tag |
2 | softwareCreator | The person or organization entity that created the software component. |
3 | aggregator | From [SWID], "An organization or system that encapsulates software from their own and/or other organizations into a different distribution process (as in the case of virtualization), or as a completed system to accomplish a specific task (as in the case of a value added reseller)." |
4 | distributor | From [SWID], "An entity that furthers the marketing, selling and/or distribution of software from the original place of manufacture to the ultimate user without modifying the software, its packaging or its labelling." |
5 | licensor | From [SAM] as "software licensor", a "person or organization who owns or holds the rights to issue a software license for a specific software [component]" |
6 | maintainer | The person or organization that is responsible for coordinating and making updates to the source code for the software component. This SHOULD be used when the "maintainer" is a different person or organization than the original "softwareCreator". |
The values above are registered in the IANA "Software ID Entity Role Values" registry defined in Section 6.2.5. Additional values will likely be registered over time.¶
The following table indicates the index value to use for the link-entry group's ownership item (see Section 2.7). These values match the link ownership values defined in the ISO/IEC 19770-2:2015 [SWID] specification. The "Index" value indicates the value to use as the link-entry group ownership item's value. The "Ownership Type" provides human-readable text for the value. The "Definition" describes the semantic meaning of each entry.¶
Index | Ownership Type | Definition |
---|---|---|
1 | abandon | If the software component referenced by the CoSWID tag is uninstalled, then the referenced software SHOULD NOT be uninstalled |
2 | private | If the software component referenced by the CoSWID tag is uninstalled, then the referenced software SHOULD be uninstalled as well. |
3 | shared | If the software component referenced by the CoSWID tag is uninstalled, then the referenced software SHOULD be uninstalled if no other components sharing the software. |
The values above are registered in the IANA "Software ID Link Ownership Values" registry defined in Section 6.2.6. Additional values will likely be registered over time.¶
The following table indicates the index value to use for the link-entry group's rel item (see Section 2.7). These values match the link rel values defined in the ISO/IEC 19770-2:2015 [SWID] specification. The "Index" value indicates the value to use as the link-entry group ownership item's value. The "Relationship Type" provides human-readable text for the value. The "Definition" describes the semantic meaning of each entry.¶
Index | Relationship Type | Definition |
---|---|---|
1 | ancestor | The link references a software tag for a previous release of this software. This can be useful to define an upgrade path. |
2 | component | The link references a software tag for a separate component of this software. |
3 | feature | The link references a configurable feature of this software that can be enabled or disabled without changing the installed files. |
4 | installationmedia | The link references the installation package that can be used to install this software. |
5 | packageinstaller | The link references the installation software needed to install this software. |
6 | parent | The link references a software tag that is the parent of the referencing tag. This relationship can be used when multiple software components are part of a software bundle, where the "parent" is the software tag for the bundle, and each child is a "component". In such a case, each child component can provide a "parent" link relationship to the bundle's software tag, and the bundle can provide a "component" link relationship to each child software component. |
7 | patches | The link references a software tag that the referencing software patches. Typically only used for patch tags (see Section 1.1). |
8 | requires | The link references a prerequisite for installing this software. A patch tag (see Section 1.1) can use this to represent base software or another patch that needs to be installed first. |
9 | see-also | The link references other software that may be of interest that relates to this software. |
10 | supersedes | The link references another software that this software replaces. A patch tag (see Section 1.1) can use this to represent another patch that this patch incorporates or replaces. |
11 | supplemental | The link references a software tag that the referencing tag supplements. Used on supplemental tags (see Section 1.1). |
The values above are registered in the IANA "Software ID Link Relationship Values" registry defined in Section 6.2.7. Additional values will likely be registered over time.¶
The following table indicates the index value to use for the link-entry group's use item (see Section 2.7). These values match the link use values defined in the ISO/IEC 19770-2:2015 [SWID] specification. The "Index" value indicates the value to use as the link-entry group use item's value. The "Use Type" provides human-readable text for the value. The "Definition" describes the semantic meaning of each entry.¶
Index | Use Type | Definition |
---|---|---|
1 | optional | From [SWID], "Not absolutely required; the [Link]'d software is installed only when specified." |
2 | required | From [SWID], "The [Link]'d software is absolutely required for an operation software installation." |
3 | recommended | From [SWID], "Not absolutely required; the [Link]'d software is installed unless specified otherwise." |
The values above are registered in the IANA "Software ID Link Use Values" registry defined in Section 6.2.8. Additional values will likely be registered over time.¶
This specification defines the following URI schemes for use in CoSWID and to provide interoperability with schemes used in [SWID].¶
Note: These URI schemes are used in [SWID] without an IANA registration. The present specification ensures that these URI schemes are properly defined going forward.¶
RFC Ed.: throughout this section, please replace RFC-AAAA with the RFC number of this specification and remove this note.¶
There is a need for a scheme name that can be used in URIs that point to a specific software tag by that tag's tag-id, such as the use of the link entry as described in Section 2.7. Since this scheme is used both in a standards track document and an ISO standard, this scheme needs to be used without fear of conflicts with current or future actual schemes. In Section 6.6.1, the scheme "swid" is registered as a 'permanent' scheme for that purpose.¶
URIs specifying the "swid" scheme are used to reference a software tag by its tag-id. A tag-id referenced in this way can be used to identify the tag resource in the context of where it is referenced from. For example, when a tag is installed on a given device, that tag can reference related tags on the same device using URIs with this scheme.¶
For URIs that use the "swid" scheme, the scheme specific part MUST consist of a referenced software tag's tag-id. This tag-id MUST be URI encoded according to Section 2.1 of [RFC3986].¶
The following expression is a valid example:¶
swid:2df9de35-0aff-4a86-ace6-f7dddd1ade4c¶
There is a need for a scheme name that can be used in URIs to identify a collection of specific software tags with data elements that match an XPath expression, such as the use of the link entry as described in Section 2.7. The scheme named "swidpath" is used for this purpose in [SWID], but not registered. To enable usage without fear of conflicts with current or future actual schemes, the present document registers it as a 'permanent' scheme for that purpose (see Section 6.6.2).¶
URIs specifying the "swidpath" scheme are used to filter tags out of a base collection, so that matching tags are included in the identified tag collection. The XPath expression [W3C.REC-xpath20-20101214] references the data that must be found in a given software tag out of base collection for that tag to be considered a matching tag. Tags to be evaluated (the base collection) include all tags in the context of where the "swidpath URI" is referenced from. For example, when a tag is installed on a given device, that tag can reference related tags on the same device using a URI with this scheme.¶
For URIs that use the "swidpath" scheme, the following requirements apply:¶
This document has a number of IANA considerations, as described in the following subsections. In summary, 6 new registries are established with this request, with initial entries provided for each registry. New values for 5 other registries are also requested.¶
This registry uses integer values as index values in CBOR maps.¶
This document defines a new registry titled "CoSWID Items". Future registrations for this registry are to be made based on [BCP26] as follows:¶
Range | Registration Procedures |
---|---|
0-32767 | Standards Action with Expert Review |
32768-4294967295 | Specification Required |
All negative values are reserved for Private Use.¶
Initial registrations for the "CoSWID Items" registry are provided below. Assignments consist of an integer index value, the item name, and a reference to the defining specification.¶
Index | Item Name | Specification |
---|---|---|
0 | tag-id | RFC-AAAA |
1 | software-name | RFC-AAAA |
2 | entity | RFC-AAAA |
3 | evidence | RFC-AAAA |
4 | link | RFC-AAAA |
5 | software-meta | RFC-AAAA |
6 | payload | RFC-AAAA |
7 | hash | RFC-AAAA |
8 | corpus | RFC-AAAA |
9 | patch | RFC-AAAA |
10 | media | RFC-AAAA |
11 | supplemental | RFC-AAAA |
12 | tag-version | RFC-AAAA |
13 | software-version | RFC-AAAA |
14 | version-scheme | RFC-AAAA |
15 | lang | RFC-AAAA |
16 | directory | RFC-AAAA |
17 | file | RFC-AAAA |
18 | process | RFC-AAAA |
19 | resource | RFC-AAAA |
20 | size | RFC-AAAA |
21 | file-version | RFC-AAAA |
22 | key | RFC-AAAA |
23 | location | RFC-AAAA |
24 | fs-name | RFC-AAAA |
25 | root | RFC-AAAA |
26 | path-elements | RFC-AAAA |
27 | process-name | RFC-AAAA |
28 | pid | RFC-AAAA |
29 | type | RFC-AAAA |
30 | Unassigned | |
31 | entity-name | RFC-AAAA |
32 | reg-id | RFC-AAAA |
33 | role | RFC-AAAA |
34 | thumbprint | RFC-AAAA |
35 | date | RFC-AAAA |
36 | device-id | RFC-AAAA |
37 | artifact | RFC-AAAA |
38 | href | RFC-AAAA |
39 | ownership | RFC-AAAA |
40 | rel | RFC-AAAA |
41 | media-type | RFC-AAAA |
42 | use | RFC-AAAA |
43 | activation-status | RFC-AAAA |
44 | channel-type | RFC-AAAA |
45 | colloquial-version | RFC-AAAA |
46 | description | RFC-AAAA |
47 | edition | RFC-AAAA |
48 | entitlement-data-required | RFC-AAAA |
49 | entitlement-key | RFC-AAAA |
50 | generator | RFC-AAAA |
51 | persistent-id | RFC-AAAA |
52 | product | RFC-AAAA |
53 | product-family | RFC-AAAA |
54 | revision | RFC-AAAA |
55 | summary | RFC-AAAA |
56 | unspsc-code | RFC-AAAA |
57 | unspsc-version | RFC-AAAA |
58-4294967295 | Unassigned |
The following IANA registries provide a mechanism for new values to be added over time to common enumerations used by SWID and CoSWID. While neither the CoSWID nor SWID specification is subordinate to the other and will evolve as their respective standards group chooses, there is value in supporting alignment between the two standards. Shared use of common code points, as spelled out in these registries, will facilitate this alignment, hence the intent for shared use of these registries and the decision to use "swidsoftware-id" (rather than "swid" or "coswid") in registry names.¶
The following registries allow for the registration of index values and names. New registrations will be permitted through either a Standards Action with Expert Review policy or a Specification Required policy [BCP26].¶
The following registries also reserve the integer-based index values in the range of -1 to -256 for private use as defined by Section 4.1 of [BCP26]. This allows values -1 to -24 to be expressed as a single uint_8t in CBOR, and values -25 to -256 to be expressed using an additional uint_8t in CBOR.¶
The integer-based index values in the private use range (-1 to -256) are intended for testing purposes and closed environments; values in other ranges SHOULD NOT be assigned for testing.¶
For names that correspond to private use index values, an Internationalized Domain Name prefix MUST be used to prevent name conflicts using the form:¶
domainprefix/name¶
Where both "domainprefix" and "name" MUST each be either an NR-LDH label or a U-label as defined by [RFC5890], and "name" also MUST be a unique name within the namespace defined by the "domainprefix". Use of a prefix in this way allows for a name to be used in the private use range. This is consistent with the guidance in [BCP178].¶
Designated experts MUST ensure that new registration requests meet the following additional criteria:¶
This document establishes a new registry titled "Software ID Version Scheme Values". This registry provides index values for use as version-scheme item values in this document and version scheme names for use in [SWID].¶
[TO BE REMOVED: This registration should take place at the following location: https://www.iana.org/assignments/software-id]¶
This registry uses the registration procedures defined in Section 6.2.1 with the following associated ranges:¶
Range | Registration Procedures |
---|---|
0-16383 | Standards Action with Expert Review |
16384-65535 | Specification Required |
Assignments MUST consist of an integer Index value, the Version Scheme Name, and a reference to the defining specification.¶
Initial registrations for the "Software ID Version Scheme Values" registry are provided below, which are derived from the textual version scheme names defined in [SWID].¶
Index | Version Scheme Name | Specification |
---|---|---|
0 | Reserved | |
1 | multipartnumeric | See Section 4.1 |
2 | multipartnumeric+suffix | See Section 4.1 |
3 | alphanumeric | See Section 4.1 |
4 | decimal | See Section 4.1 |
5-16383 | Unassigned | |
16384 | semver | See Section 4.1 |
16385-65535 | Unassigned |
Registrations MUST conform to the expert review criteria defined in Section 6.2.3.¶
Designated experts MUST also ensure that newly requested entries define a value space for the corresponding version item that is unique from other previously registered entries. Note: The initial registrations violate this requirement, but are included for backwards compatibility with [SWID]. See also Section 4.1.¶
This document establishes a new registry titled "Software ID Entity Role Values". This registry provides index values for use as entity-entry role item values in this document and entity role names for use in [SWID].¶
[TO BE REMOVED: This registration should take place at the following location: https://www.iana.org/assignments/software-id]¶
This registry uses the registration procedures defined in Section 6.2.1 with the following associated ranges:¶
Range | Registration Procedures |
---|---|
0-127 | Standards Action with Expert Review |
128-255 | Specification Required |
Assignments consist of an integer Index value, a Role Name, and a reference to the defining specification.¶
Initial registrations for the "Software ID Entity Role Values" registry are provided below, which are derived from the textual entity role names defined in [SWID].¶
Index | Role Name | Specification |
---|---|---|
0 | Reserved | |
1 | tagCreator | See Section 4.2 |
2 | softwareCreator | See Section 4.2 |
3 | aggregator | See Section 4.2 |
4 | distributor | See Section 4.2 |
5 | licensor | See Section 4.2 |
6 | maintainer | See Section 4.2 |
7-255 | Unassigned |
Registrations MUST conform to the expert review criteria defined in Section 6.2.3.¶
This document establishes a new registry titled "Software ID Link Ownership Values". This registry provides index values for use as link-entry ownership item values in this document and link ownership names for use in [SWID].¶
[TO BE REMOVED: This registration should take place at the following location: https://www.iana.org/assignments/software-id]¶
This registry uses the registration procedures defined in Section 6.2.1 with the following associated ranges:¶
Range | Registration Procedures |
---|---|
0-127 | Standards Action with Expert Review |
128-255 | Specification Required |
Assignments consist of an integer Index value, an Ownership Type Name, and a reference to the defining specification.¶
Initial registrations for the "Software ID Link Ownership Values" registry are provided below, which are derived from the textual entity role names defined in [SWID].¶
Index | Ownership Type Name | Definition |
---|---|---|
0 | Reserved | |
1 | abandon | See Section 4.3 |
2 | private | See Section 4.3 |
3 | shared | See Section 4.3 |
4-255 | Unassigned |
Registrations MUST conform to the expert review criteria defined in Section 6.2.3.¶
This document establishes a new registry titled "Software ID Link Relationship Values". This registry provides index values for use as link-entry rel item values in this document and link ownership names for use in [SWID].¶
[TO BE REMOVED: This registration should take place at the following location: https://www.iana.org/assignments/software-id]¶
This registry uses the registration procedures defined in Section 6.2.1 with the following associated ranges:¶
Range | Registration Procedures |
---|---|
0-32767 | Standards Action with Expert Review |
32768-65535 | Specification Required |
Assignments consist of an integer Index value, the Relationship Type Name, and a reference to the defining specification.¶
Initial registrations for the "Software ID Link Relationship Values" registry are provided below, which are derived from the link relationship values defined in [SWID].¶
Index | Relationship Type Name | Specification |
---|---|---|
0 | Reserved | |
1 | ancestor | See Section 4.4 |
2 | component | See Section 4.4 |
3 | feature | See Section 4.4 |
4 | installationmedia | See Section 4.4 |
5 | packageinstaller | See Section 4.4 |
6 | parent | See Section 4.4 |
7 | patches | See Section 4.4 |
8 | requires | See Section 4.4 |
9 | see-also | See Section 4.4 |
10 | supersedes | See Section 4.4 |
11 | supplemental | See Section 4.4 |
12-65535 | Unassigned |
Registrations MUST conform to the expert review criteria defined in Section 6.2.3.¶
Designated experts MUST also ensure that a newly requested entry documents the URI schemes allowed to be used in an href associated with the link relationship and the expected resolution behavior of these URI schemes. This will help to ensure that applications processing software tags are able to interoperate when resolving resources referenced by a link of a given type.¶
This document establishes a new registry titled "Software ID Link Use Values". This registry provides index values for use as link-entry use item values in this document and link use names for use in [SWID].¶
[TO BE REMOVED: This registration should take place at the following location: https://www.iana.org/assignments/software-id]¶
This registry uses the registration procedures defined in Section 6.2.1 with the following associated ranges:¶
Range | Registration Procedures |
---|---|
0-127 | Standards Action with Expert Review |
128-255 | Specification Required |
Assignments consist of an integer Index value, the Link Use Type Name, and a reference to the defining specification.¶
Initial registrations for the "Software ID Link Use Values" registry are provided below, which are derived from the link relationship values defined in [SWID].¶
Index | Link Use Type Name | Specification |
---|---|---|
0 | Reserved | |
1 | optional | See Section 4.5 |
2 | required | See Section 4.5 |
3 | recommended | See Section 4.5 |
4-255 | Unassigned |
Registrations MUST conform to the expert review criteria defined in Section 6.2.3.¶
IANA is requested to add the following to the IANA "Media Types" registry [IANA.media-types].¶
Type name: application¶
Subtype name: swid+cbor¶
Required parameters: none¶
Optional parameters: none¶
Encoding considerations: Binary (encoded as CBOR [RFC8949]). See RFC-AAAA for details.¶
Security considerations: See Section 9 of RFC-AAAA.¶
Interoperability considerations: Applications MAY ignore any key value pairs that they do not understand. This allows backwards compatible extensions to this specification.¶
Published specification: RFC-AAAA¶
Applications that use this media type: The type is used by software asset management systems, vulnerability assessment systems, and in applications that use remote integrity verification.¶
Fragment Identifier Considerations: The syntax and semantics of fragment identifiers specified for "application/swid+cbor" are as specified for "application/cbor". (At publication of RFC-AAAA, there is no fragment identification syntax defined for "application/cbor".)¶
Additional information:¶
Magic number(s): if tagged, first five bytes in hex: da 53 57 49 44 (see Section 8 in RFC-AAAA)¶
File extension(s): coswid¶
Macintosh file type code(s): none¶
Macintosh Universal Type Identifier code: org.ietf.coswid conforms to public.data¶
Person & email address to contact for further information: IESG <iesg@ietf.org>¶
Intended usage: COMMON¶
Restrictions on usage: None¶
Author: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>¶
Change controller: IESG¶
IANA is requested to assign a CoAP Content-Format ID for the CoSWID media type in the "CoAP Content-Formats" sub-registry, from the "IETF Review or IESG Approval" space (256..999), within the "CoRE Parameters" registry [RFC7252] [IANA.core-parameters]:¶
Media type | Encoding | ID | Reference |
---|---|---|---|
application/swid+cbor | - | TBD1 | RFC-AAAA |
IANA is requested to allocate a tag in the "CBOR Tags" registry [IANA.cbor-tags], preferably with the specific value requested:¶
Tag | Data Item | Semantics |
---|---|---|
1398229316 | map | Concise Software Identifier (CoSWID) [RFC-AAAA] |
The ISO 19770-2:2015 SWID specification describes use of the "swid" and "swidpath" URI schemes, which are currently in use in implementations. This document continues this use for CoSWID. The following subsections provide registrations for these schemes in to ensure that a permanent registration exists for these schemes that is suitable for use in the SWID and CoSWID specifications.¶
URI schemes are registered within the "Uniform Resource Identifier (URI) Schemes" registry maintained at [IANA.uri-schemes].¶
IANA is requested to register the URI scheme "swid". This registration request complies with [RFC7595].¶
swid¶
Permanent¶
Applications that require Software-IDs (SWIDs) or Concise Software-IDs (CoSWIDs); see Section 5.1 of RFC-AAAA.¶
IETF Chair <chair@ietf.org>¶
IESG <iesg@ietf.org>¶
Section 5.1 in RFC-AAAA¶
IANA is requested to register the URI scheme "swidpath". This registration request complies with [RFC7595].¶
swidpath¶
Permanent¶
Applications that require Software-IDs (SWIDs) or Concise Software-IDs (CoSWIDs); see Section 5.2 of RFC-AAAA.¶
IETF Chair <chair@ietf.org>¶
IESG <iesg@ietf.org>¶
Section 5.2 in RFC-AAAA¶
The Software Inventory Message and Attributes (SWIMA) for PA-TNC specification [RFC8412] defines a standardized method for collecting an endpoint device's software inventory. A CoSWID can provide evidence of software installation which can then be used and exchanged with SWIMA. This registration adds a new entry to the IANA "Software Data Model Types" registry defined by [RFC8412] [IANA.pa-tnc-parameters] to support CoSWID use in SWIMA as follows:¶
Pen: 0¶
Integer: TBD2¶
Name: Concise Software Identifier (CoSWID)¶
Reference: RFC-AAAA¶
Deriving Software Identifiers:¶
A Software Identifier generated from a CoSWID tag is expressed as a concatenation of the form in [RFC5234] as follows:¶
TAG_CREATOR_REGID "_" "_" UNIQUE_ID¶
Where TAG_CREATOR_REGID is the reg-id item value of the tag's entity item having the role value of 1 (corresponding to "tag creator"), and the UNIQUE_ID is the same tag's tag-id item. If the tag-id item's value is expressed as a 16-byte binary string, the UNIQUE_ID MUST be represented using the UUID string representation defined in [RFC4122] including the "urn:uuid:" prefix.¶
The TAG_CREATOR_REGID and the UNIQUE_ID are connected with a double underscore (_), without any other connecting character or whitespace.¶
SWID tags, as defined in the ISO-19770-2:2015 XML schema, can include cryptographic signatures to protect the integrity of the SWID tag. In general, tags are signed by the tag creator (typically, although not exclusively, the vendor of the software component that the SWID tag identifies). Cryptographic signatures can make any modification of the tag detectable, which is especially important if the integrity of the tag is important, such as when the tag is providing reference integrity measurements for files. The ISO-19770-2:2015 XML schema uses XML DSIG to support cryptographic signatures.¶
Signing CoSWID tags follows the procedures defined in CBOR Object Signing and Encryption [I-D.ietf-cose-rfc8152bis-struct]. A CoSWID tag MUST be wrapped in a COSE Signature structure, either COSE_Sign1 or COSE_Sign. In the first case, a Single Signer Data Object (COSE_Sign1) contains a single signature and MUST be signed by the tag creator. The following CDDL specification defines a restrictive subset of COSE header parameters that MUST be used in the protected header in this case.¶
<CODE BEGINS> COSE-Sign1-coswid<payload> = [ protected: bstr .cbor protected-signed-coswid-header, unprotected: unprotected-signed-coswid-header, payload: bstr .cbor payload, signature: bstr, ] cose-label = int / tstr cose-values = any protected-signed-coswid-header = { 1 => int, ; algorithm identifier 3 => "application/swid+cbor", * cose-label => cose-values, } unprotected-signed-coswid-header = { * cose-label => cose-values, } <CODE ENDS>¶
The COSE_Sign structure allows for more than one signature, one of which MUST be issued by the tag creator, to be applied to a CoSWID tag and MAY be used. The corresponding usage scenarios are domain-specific and require well-specified application guidance.¶
<CODE BEGINS> COSE-Sign-coswid<payload> = [ protected: bstr .cbor protected-signed-coswid-header1, unprotected: unprotected-signed-coswid-header, payload: bstr .cbor payload, signature: [ * COSE_Signature ], ] protected-signed-coswid-header1 = { 3 => "application/swid+cbor", * cose-label => cose-values, } protected-signature-coswid-header = { 1 => int, ; algorithm identifier * cose-label => cose-values, } unprotected-sign-coswid-header = { * cose-label => cose-values, } COSE_Signature = [ protected: bstr .cbor protected-signature-coswid-header, unprotected: unprotected-sign-coswid-header, signature : bstr ] <CODE ENDS>¶
Additionally, the COSE Header counter signature MAY be used as an attribute in the unprotected header map of the COSE envelope of a CoSWID [I-D.ietf-cose-countersign]. The application of counter signing enables second parties to provide a signature on a signature allowing for a proof that a signature existed at a given time (i.e., a timestamp).¶
A CoSWID MUST be signed, using the above mechanism, to protect the integrity of the CoSWID tag. See the security considerations (in Section 9) for more information on why a signed CoSWID is valuable in most cases.¶
This specification allows for tagged and untagged CBOR data items that are CoSWID tags. Consecutively, the CBOR tag for CoSWID tags defined in Table 21 SHOULD be used in conjunction with CBOR data items that are a CoSWID tags. Other CBOR tags MUST NOT be used with a CBOR data item that is a CoSWID tag. If tagged, both signed and unsigned CoSWID tags MUST use the CoSWID CBOR tag. In case a signed CoSWID is tagged, a CoSWID CBOR tag MUST be appended before the COSE envelope whether it is a COSE_Untagged_Message or a COSE_Tagged_Message. In case an unsigned CoSWID is tagged, a CoSWID CBOR tag MUST be appended before the CBOR data item that is the CoSWID tag.¶
<CODE BEGINS> coswid = unsigned-coswid / signed-coswid unsigned-coswid = concise-swid-tag / tagged-coswid<concise-swid-tag> signed-coswid1 = signed-coswid-for<unsigned-coswid> signed-coswid = signed-coswid1 / tagged-coswid<signed-coswid1> tagged-coswid<T> = #6.1398229316(T) signed-coswid-for<payload> = #6.18(COSE-Sign1-coswid<payload>) / #6.98(COSE-Sign-coswid<payload>) <CODE ENDS>¶
This specification allows for a tagged CoSWID tag to reside in a COSE envelope that is also tagged with a CoSWID CBOR tag. In cases where a tag creator is not a signer (e.g., hand-offs between entities in a trusted portion of a supply-chain), retaining CBOR tags attached to unsigned CoSWID tags can be of great use. Nevertheless, redundant use of tags SHOULD be avoided when possible.¶
The following security considerations for use of CoSWID tags focus on:¶
A tag is considered "authoritative" if the CoSWID tag was created by the software provider. An authoritative CoSWID tag contains information about a software component provided by the supplier of the software component, who is expected to be an expert in their own software. Thus, authoritative CoSWID tags can represent authoritative information about the software component. The degree to which this information can be trusted depends on the tag's chain of custody and the ability to verify a signature provided by the supplier if present in the CoSWID tag. The provisioning and validation of CoSWID tags are handled by local policy and is outside the scope of this document.¶
A signed CoSWID tag (see Section 7) whose signature has been validated can be relied upon to be unchanged since it was signed. By contrast, the data contained in unsigned tags can be altered by any user or process with write-access to the tag. To support signature validation, there is the need to associate the right key with the software provider or party originating the signature in a secure way. This operation is application specific and needs to be addressed by the application or a user of the application; a specific approach for which is out-of-scope for this document.¶
When an authoritative tag is signed, the originator of the signature can be verified. A trustworthy association between the signature and the originator of the signature can be established via trust anchors. A certification path between a trust anchor and a certificate including a public key enabling the validation of a tag signature can realize the assessment of trustworthiness of an authoritative tag. Verifying that the software provider is the signer is a different matter. This requires an association between the signature and the tag's entity item associated corresponding to the software provider. No mechanism is defined in this draft to make this association; therefore, this association will need to be handled by local policy. As always, the validity of a signature does not imply veracity of the signed statements: anyone can sign assertions such that the software is from a specific software-creator or that a specific persistent-id applies; policy needs to be applied to evaluate these statements and to determine their suitability for a specific use.¶
Loss of control of signing credentials used to sign CoSWID tags would create doubt about the authenticity and integrity of any CoSWID tags signed using the compromised keys. In such cases, the legitimate tag signer (namely, the software provider for an authoritative CoSWID tag) can employ uncompromised signing credentials to create a new signature on the original tag. The tag version number would not be incremented since the tag itself was not modified. Consumers of CoSWID tags would need to validate the tag using the new credentials and would also need to make use of revocation information available for the compromised credentials to avoid validating tags signed with them. The process for doing this is beyond the scope of this specification.¶
The CoSWID format allows the use of hash values without an accompanying hash algorithm identifier. This exposes the tags to some risk of cross-algorithm attacks. We believe that this can become a practical problem only if some implementations allow the use of insecure hash algorithms. Since it may not become known immediately when an algorithm becomes insecure, this leads to a strong recommendation to only include support for hash algorithms that are generally considered secure, and not just marginally so.¶
CoSWID tags are intended to contain public information about software components and, as such, the contents of a CoSWID tag (as opposed to the set of tags that apply to the endpoint, see below) does not need to be protected against unintended disclosure on an endpoint. Conversely, generators of CoSWID tags need to ensure that only public information is disclosed. Entitlement Keys are an example for information where particular care is required; tag authors are advised not to record unprotected, private software license keys in this field.¶
CoSWID tags are intended to be easily discoverable by authorized applications and users on an endpoint in order to make it easy to determine the tagged software load. Access to the collection of an endpoint's CoSWID tags needs to be appropriately controlled to authorized applications and users using an appropriate access control mechanism.¶
Since the tag-id of a CoSWID tag can be used as a global index value, failure to ensure the tag-id's uniqueness can cause collisions or ambiguity in CoSWID tags that are retrieved or processed using this identifier. CoSWID is designed to not require a registry of identifiers. As a result, CoSWID requires the tag creator to employ a method of generating a unique tag identifier. Specific methods of generating a unique identifier are beyond the scope of this specification. A collision in tag-ids may result in false positives/negatives in software integrity checks or mis-identification of installed software, undermining CoSWID use cases such as vulnerability identification, software inventory, etc. If such a collision is detected, then the tag consumer may want to contact the maintainer of the CoSWID to have them issue a correction addressing the collision; however, this also discloses to the maintainer that the consumer has the other tag with the given tag-id in their database. More generally speaking, a tag consumer needs to be robust against such collisions lest the collision become a viable attack vector.¶
CoSWID tags are designed to be easily added and removed from an endpoint along with the installation or removal of software components. On endpoints where addition or removal of software components is tightly controlled, the addition or removal of CoSWID tags can be similarly controlled. On more open systems, where many users can manage the software inventory, CoSWID tags can be easier to add or remove. On such systems, it can be possible to add or remove CoSWID tags in a way that does not reflect the actual presence or absence of corresponding software components. Similarly, not all software products automatically install CoSWID tags, so products can be present on an endpoint without providing a corresponding CoSWID tag. As such, any collection of CoSWID tags cannot automatically be assumed to represent either a complete or fully accurate representation of the software inventory of the endpoint. However, especially on endpoint devices that more strictly control the ability to add or remove applications, CoSWID tags are an easy way to provide a preliminary understanding of that endpoint's software inventory.¶
As CoSWID tags do not expire, inhibiting new CoSWID tags from reaching an intended consumer would render that consumer stuck with outdated information, potentially leaving associated vulnerabilities or weaknesses unmitigated. Therefore, a CoSWID tag consumer should actively check for updated tag-versions via more than one means.¶
This specification makes use of relative paths (e.g., filesystem paths) in several places. A signed COSWID tag cannot make use of these to derive information that is considered to be covered under the signature. Typically, relative file system paths will be used to identify targets for an installation, not sources of tag information.¶
Any report of an endpoint's CoSWID tag collection provides information about the software inventory of that endpoint. If such a report is exposed to an attacker, this can tell them which software products and versions thereof are present on the endpoint. By examining this list, the attacker might learn of the presence of applications that are vulnerable to certain types of attacks. As noted earlier, CoSWID tags are designed to be easily discoverable by authorized applications and users on an endpoint, but this does not present a significant risk since an attacker would already need to have access to the endpoint to view that information. However, when the endpoint transmits its software inventory to another party, or that inventory is stored on a server for later analysis, this can potentially expose this information to attackers who do not yet have access to the endpoint. For this reason, it is important to protect the confidentiality of CoSWID tag information that has been collected from an endpoint in transit and at rest, not because those tags individually contain sensitive information, but because the collection of CoSWID tags and their association with an endpoint reveals information about that endpoint's attack surface.¶
Finally, both the ISO-19770-2:2015 XML schema SWID definition and the CoSWID CDDL specification allow for the construction of "infinite" tags with link item loops or tags that contain malicious content with the intent of creating non-deterministic states during validation or processing of those tags. While software providers are unlikely to do this, CoSWID tags can be created by any party and the CoSWID tags collected from an endpoint could contain a mixture of vendor and non-vendor created tags. For this reason, a CoSWID tag might contain potentially malicious content. Input sanitization, loop detection, and signature verification are ways that implementations can address this concern.¶
More generally speaking, the security considerations of [RFC8949], [I-D.ietf-cose-rfc8152bis-struct], and [I-D.ietf-cose-countersign] apply.¶
As noted in Section 9, collected information about an endpoint's software load, such as what might be represented by an endpoint's CoSWID tag collection, could be used to identify vulnerable software for attack. Collections of endpoint software information also can have privacy implications for users. The set of application a user installs can give clues to personal matters such as political affiliation, banking and investments, gender, sexual orientation, medical concerns, etc. While the collection of CoSWID tags on an endpoint wouldn't increase the privacy risk (since a party able to view those tags could also view the applications themselves), if those CoSWID tags are gathered and stored in a repository somewhere, visibility into the repository now also gives visibility into a user's application collection. For this reason, repositories of collected CoSWID tags not only need to be protected against collection by malicious parties, but even authorized parties will need to be vetted and made aware of privacy responsibilities associated with having access to this information. Likewise, users should be made aware that their software inventories are being collected from endpoints. Furthermore, when collected and stored by authorized parties or systems, the inventory data needs to be protected as both security and privacy-sensitive information.¶
This section is to be removed before publishing as an RFC.¶
[THIS SECTION TO BE REMOVED BY THE RFC EDITOR.]¶
Changes from version 12 to version 14:¶
Changes in version 12:¶
Changes from version 03 to version 11:¶
Changes from version 02 to version 03:¶
Changes from version 01 to version 02:¶
Changes from version 00 to version 01:¶
Changes since adopted as a WG I-D -00:¶
Changes from version 06 to version 07:¶
Changes from version 05 to version 06:¶
Changes from version 04 to version 05:¶
Changes from version 03 to version 04:¶
Changes from version 02 to version 03:¶
Changes from version 01 to version 02:¶
Changes from version 00 to version 01:¶
This document draws heavily on the concepts defined in the ISO/IEC 19770-2:2015 specification. The authors of this document are grateful for the prior work of the 19770-2 contributors.¶
We are also grateful for the careful reviews provided by the IESG reviewers. Special thanks go to Benjamin Kaduk.¶
Carsten Bormann contributed to the CDDL specifications and the IANA considerations.¶