Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

Mike Jones <> Tue, 06 March 2018 00:44 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id C8B18126DED; Mon, 5 Mar 2018 16:44:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (1024-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id ds5EgI_CiZUa; Mon, 5 Mar 2018 16:44:04 -0800 (PST)
Received: from ( [IPv6:2a01:111:f400:fe45::72e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 859711241F5; Mon, 5 Mar 2018 16:44:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=y4hyVSgPt9p8GU1T4LJrf9/dffz+FgmTICGkvHKBGBY=; b=OV6TpheM/ijKRkGLzJ+0Tv89Y2wXqResGj2EPxTk6bypnuwf5YM1x0Ai8lSdJGEY2/OrM7HHSryOKmDWYMRTmd1aDRYdxsfvID3OQ/GftmqKBOdVeEFtXweC8iStr9p+1rG7TN0dMOxk45I7xXenMkKCIlWubsBhsIt0ehCCkRM=
Received: from ( by ( with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.567.3; Tue, 6 Mar 2018 00:44:02 +0000
Received: from ([fe80::9866:f6b5:e2d6:50]) by ([fe80::9866:f6b5:e2d6:50%2]) with mapi id 15.20.0588.001; Tue, 6 Mar 2018 00:44:02 +0000
From: Mike Jones <>
To: Dan Romascanu <>
CC: Jim Schaad <>, gen-art <>, "" <>, ietf <>, Benjamin Kaduk <>, "" <>
Thread-Topic: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12
Date: Tue, 06 Mar 2018 00:44:02 +0000
Message-ID: <>
References: <> <021201d3af3e$1f204cc0$5d60e640$> <> <> <> <028701d3aff3$df7ef6f0$9e7ce4d0$> <> <> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2018-03-06T00:44:00.8872639Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic; Sensitivity=General
x-originating-ip: [2001:4898:80e8:a::562]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; SN6PR2101MB1008; 7:hctylMqgcx237Y9GxgBtaPeFtTbuACETX9yvEOmuZCIT8p4DfmV9NFYannW+9LhS/l1OgphMOHgKVS9trhTQtZOHRb01HWs9Or/IhaYgYvyi1zcOEkSeZPIEWZE8Drdq7anDcgYiczP2xjmOaW/t9Gyy9uiRVmYnV3XodlbiQb8wKwjVN0pTU0//hj3vV/8mxKv4aJR3WACHFjDp7kG4q8KrNXUY7yMDXP6E6xOcPecg0k97Wl+fk8LfDNwC1o9o; 20:rqN6zIABQN6iHQgVafGqkZytMMRhNPhCTq/j31HrOg8RDNYac0XLLLLL+gBQmkfp6N7yEMaK1WOxYDlFXcm70qUpuVRlAGW13+QgTII1LVCywAiiUrIui9o3+jhl7qci9RBtFx2e2jLDbqVu5yCWMudGiCsJe+MgaaIZ6IAArsw=
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: b9272da5-2dcb-4df2-1709-08d582fb5b99
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(48565401081)(2017052603328)(7193020); SRVR:SN6PR2101MB1008;
x-ms-traffictypediagnostic: SN6PR2101MB1008:
x-microsoft-antispam-prvs: <>
x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(192374486261705)(85827821059158)(100405760836317)(21748063052155)(240460790083961)(1591387915157);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(61425038)(6040501)(2401047)(5005006)(8121501046)(3231220)(944501244)(52105095)(93006095)(93001095)(10201501046)(3002001)(6055026)(61426038)(61427038)(6041288)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(6072148)(201708071742011); SRVR:SN6PR2101MB1008; BCL:0; PCL:0; RULEID:; SRVR:SN6PR2101MB1008;
x-forefront-prvs: 06036BD506
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(396003)(39860400002)(39380400002)(366004)(54094003)(76104003)(51914003)(199004)(189003)(13464003)(102836004)(5250100002)(6346003)(10290500003)(76176011)(59450400001)(46003)(186003)(74316002)(10090500001)(5660300001)(53546011)(7736002)(86612001)(86362001)(345774005)(53936002)(3660700001)(1411001)(6246003)(54906003)(6506007)(2900100001)(7696005)(93886005)(8990500004)(53376002)(316002)(19609705001)(81166006)(33656002)(81156014)(229853002)(2906002)(68736007)(3280700002)(8676002)(4326008)(25786009)(6436002)(22452003)(14454004)(478600001)(72206003)(106356001)(55016002)(99286004)(39060400002)(8936002)(606006)(105586002)(2950100002)(6916009)(966005)(790700001)(9686003)(54896002)(236005)(6116002)(6306002)(97736004); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR2101MB1008;; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None ( does not designate permitted sender hosts)
authentication-results: spf=none (sender IP is );
x-microsoft-antispam-message-info: 1JW55Z7gZP8L/y+BwOqerol+MaWaXzmHQViE7W03u4CDD40SfLmgdTdAYjQcd/rXLH1OgdCnTyowWpKQo261QDBTnKmWPHXUh+oiI7wMv36tcc3PHu1utQH6vJe5xKMxu/d2h10m9OnMLCyeS5vVd+/FV8Vt2naoCxS8c2lV09Y3d4bL/n7bldw76wuMxTZ9hVEJusekq+FAiEneh967tJlGEWFvgRCDpsP4G2wZsgHrw/AjAgsB69mjrGgq1IfGOM3vHaji70kMTy0iG4YN4Sqbxg61irLlGHsB3/hCRz5IqKp4EPOM33JEYAuxNp82QihBLKF2Qrm9yhaJ5HIO8A==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_SN6PR2101MB0943543E355D779E13E3B411F5D90SN6PR2101MB0943_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: b9272da5-2dcb-4df2-1709-08d582fb5b99
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2018 00:44:02.6393 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR2101MB1008
Archived-At: <>
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 06 Mar 2018 00:44:08 -0000

Dan, you’ll find changes that address your review comments in  See for a summary of the changes made.

Thanks again for your useful review!

                                                          -- Mike

From: Dan Romascanu <>
Sent: Tuesday, February 27, 2018 11:24 PM
To: Mike Jones <>
Cc: Jim Schaad <>; gen-art <>;; ietf <>; Benjamin Kaduk <>;
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

Hi Mike,
The edits that you propose in #1 and #2 are good IMO and they would improve the clarity of the document.
Concerning #3 - all the 'running code' examples that you provided are all for one type of policy only - Specification Required. The case here seems a little more complex, as the review and required advice refer to multiple policies. Thanks to the discussion and information provided by you and Jim, I believe that I better understand now how this works, and I defer to the General Area and Security AD the decision whether the text is sufficiently clear.
Thanks for addressing my comments.

On Wed, Feb 28, 2018 at 12:52 AM, Mike Jones <<>> wrote:
Replies inline…

From: Ace <<>> On Behalf Of Dan Romascanu
Sent: Tuesday, February 27, 2018 2:23 PM
To: Jim Schaad <<>>
Cc: gen-art <<>>;<>; ietf <<>>; Benjamin Kaduk <<>>;<>
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

Hi Jim,

There are still a few problems:

1. The policies and mapping to the values ranges are hidden in the Claim Key field in the template (the comment also made by Kathleen)

Per my earlier note, I will be making this language clearer when the next revision is published.

2. At least one incorrect policy name is used: Standards Track Required - do you mean Standards Action (?)

Thanks – I’ll update the terminology when the next draft is published.

3. You describe a process that involves a mail list (<>) and Experts Review. This description is not clear. Usually IANA approaches one DE for advice and expects the advice from the same DE in a reasonable period of time. If I understand correctly the process described in Section 9.1 one or more DEs make a recommendation and run it with the mail list. Who establishes the consensus on the mail list? Assuming the mail list disagrees with the DE recommendation, who decides?

This is the process used for the .well-known URI spec, the JSON Web Token (JWT) spec, the JOSE specs, many OAuth specs and it works well.  It allows interested parties to see and comment on registration requests.  The Designated Experts are still the ones to decide.  See these references for some uses of this kind of publicly-visible registration procedure: (using<>) (using<>) (using<>) (using<>)

I can find more examples of the use of this publicly-visible registration procedure if you like.


                                                          Thanks for the careful review, Dan,
                                                          -- Mike

On Tue, Feb 27, 2018 at 7:53 PM, Jim Schaad <<>> wrote:
Integer values between -256 and 255 and strings of length 1 are designated as Standards Track Required.

Integer values from -65536 to 65535 and strings of length 2 are designated as Specification Required.

Integer values of greater than 65535 and strings of length greater than 2 are designated as Expert Review.

Integer values less than -65536 are marked as Private Use.

So that says what IANA policy is to be used for each of the different items.  This defines the policies and the ranges for those policies.

There is not anything that is making a distinction on what the criteria to be used by the DE in the document which is separate, but I don’t think that is needed.  This is why they are DEs.

I still don’t see what you think is missing.


From: Dan Romascanu [<>]
Sent: Tuesday, February 27, 2018 2:00 AM
To: Benjamin Kaduk <<>>
Cc: Jim Schaad <<>>; gen-art <<>>;<>; ietf <<>>;<>
Subject: Re: [Ace] Genart telechat review of draft-ietf-ace-cbor-web-token-12

See also my other notes.
I believe that what the document tries to say is:
Register R is divided into four different ranges R1, R2, R3, R4 (defining the value limits may be useful)
Values in range R1 are allocated according to policy P1 in the case that ...
Values in range R2 are allocated according to policy P2 in the case that ...
Values in range R3 are allocated according to policy P3 in the case that ...
Values in range R4 are allocated according to policy P4 in the case that ...
But it doesn't say it. Mentioning four concurrent policies for the same registry without separation of values range, and without providing clear instructions when each policy is recommended to be used, seems confusing to me, and may be confusing for users of this document in the future.

On Tue, Feb 27, 2018 at 5:40 AM, Benjamin Kaduk <<>> wrote:
On Mon, Feb 26, 2018 at 11:19:04PM +0200, Dan Romascanu wrote:
> Hi Jim,
> Thank you for your answer and for addressing my comments.
> On item #2:
> On Mon, Feb 26, 2018 at 10:12 PM, Jim Schaad <<>> wrote:
> >
> >
> > > -----Original Message-----
> > > From: Dan Romascanu [<>]
> > >
> >
> > ...
> > >
> > > 2. I am a little confused by the definition of policies in Section 9.1:
> > >
> > >    Depending upon the values being requested, registration requests are
> > >    evaluated on a Standards Track Required, Specification Required,
> > >    Expert Review, or Private Use basis [RFC8126] after a three-week
> > >    review period on the<> mailing list, on the
> > >    advice of one or more Designated Experts.
> > >
> > > How does this work? The request is forwarded to the designated expert,
> > > he/she make a recommendation concerning the policy on the mail list, and
> > > depending on the feedback received a policy is selected? Who establishes
> > > consensus?
> > >
> > > Frankly, I wonder if this can work at all. Are there other examples of
> > four
> > > different policies for the same registry, applied on a case-to-case
> > basis?
> >
> > This is the same approach that is being used for the COSE registries.  As
> > an example, you can look at
> > assignments/cose/cose.xhtml#algorithms.
> >
> > Part of the issue about this is that the JOSE/JWT registries do have the
> > same different policies, but that differences are hidden from the IANA
> > registry.  Since they allow for a URI to be used as the identifier of a
> > field, only the plain text versions are registered.  Thus I can use "
> >" as an identifier.  Since for CBOR
> > the set of tag values is closed and does not have this escape (nor would
> > one want the length of the tag) it is necessary to have this break down of
> > tag fields.
> >
> >
> >
> >
> This does not seem to be exactly the same approach. The COSE RFC 8152
> defines the registry policy in a different manner. There is only one policy
> that is proposed 'Expert Review' and than the Expert Review Instructions
> are used to define the cases when a Standards Track specification is
> required. No such text exists in the current I-D. There is no separation of
> the values space in the registry according to the type of assignment here,
> as  in RFC 8152.
The template in section 9.1.1 has the different policies for the
different integer ranges, under the 'Claim Key' section.  Kathleen
(IIRC) already noted that this should probably be repeated in the
introductory part of section 9.1 as well, and that will be done
before the document is sent to the IESG.