Re: [jose] Canonical JSON form

Anders Rundgren <anders.rundgren.net@gmail.com> Sat, 24 November 2018 07:16 UTC

Return-Path: <anders.rundgren.net@gmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2174130DFB for <jose@ietfa.amsl.com>; Fri, 23 Nov 2018 23:16:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fbTHZAGy1rYw for <jose@ietfa.amsl.com>; Fri, 23 Nov 2018 23:16:32 -0800 (PST)
Received: from mail-wm1-x332.google.com (mail-wm1-x332.google.com [IPv6:2a00:1450:4864:20::332]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A20A126CC7 for <jose@ietf.org>; Fri, 23 Nov 2018 23:16:32 -0800 (PST)
Received: by mail-wm1-x332.google.com with SMTP id c126so13635184wmh.0 for <jose@ietf.org>; Fri, 23 Nov 2018 23:16:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=PXAXQo4TFF2X+vZ88maeR7rFiZHSjdRnwYG7zjHjgTg=; b=j2YZSd1GFnMHSyOPqsDBeV/H0CrnhFhSvJyBCWsOjPX418ReK0yqAOrs/UcREjU7aA LPnJ0LVmzAyFudqYVwk4pfqny5QXeKF+aNM9Dm5xmb4R9yMieUnMvldpqjQtNJ0+gKzo TANHqLyxkKPbGwewSA0LHeB+OEJlUEapQ+engBXZuit5IkkAGdvBGcQbbErhYC8eRdi7 d6A9/FIv2+QURLEjRCDf1kx6xyflTblrAWQK70AfO4baDIxiOiS274BQ7uENStWjuuQX DOlG0h9VD58s8bJJouNtpL1n2sbYFiQerW+4upcwWmhBVFk3UI1j4jLx2C74P7uORkZ0 71hQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=PXAXQo4TFF2X+vZ88maeR7rFiZHSjdRnwYG7zjHjgTg=; b=H/TlmNhjHqLP6+qIWxe3I0bSgZbuN0i4zclVWyEavrxayj796lOtMJUCk4oMJWAjcL xs8S8y9m41bO5epIkUgaqJRK7TVVSkwSWytowKy3i48afS16vrfFOH41v6yhV1NWbM/5 7IV9zHVkMFK9Vsy+3AfSZh8/13uGps9Y1nHVi7BACaYSGSIhFdLXwJThtkIYmaAve0Mg lSeYpKCfQX2HUUaWcMFmnSj3U6Lo0ZkhlSX6BF9gPMBootJ+f5Y/rUBoN1F3X0Uv2e1O H4sNH6V+XzgX45Bj4+ku9XyzwU9AbNOVIA81wzjtmAnCARQQ3LfpXEE7ksbORMNRqx9X HngQ==
X-Gm-Message-State: AA+aEWZFDqZmRiklnJoBQuRGl2e6phYDqXQel9t0vkbKHNr3fV9FbYCa uftBPU8NxQ5kJV0v/TDxV8s=
X-Google-Smtp-Source: AJdET5fEBocMzPrkqnuwRENYFBMGJIYHV51fC+/NRaHycF3l0z3wMVCAtCJeTfhjEXBal8WlxlCHkw==
X-Received: by 2002:a7b:c315:: with SMTP id k21mr15872228wmj.145.1543043789621; Fri, 23 Nov 2018 23:16:29 -0800 (PST)
Received: from [192.168.1.79] (25.131.146.77.rev.sfr.net. [77.146.131.25]) by smtp.googlemail.com with ESMTPSA id a11sm8039856wmh.26.2018.11.23.23.16.27 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 23 Nov 2018 23:16:28 -0800 (PST)
To: Bret Jordan <jordan.ietf@gmail.com>
Cc: David Waite <david@alkaline-solutions.com>, Jim Schaad <ietf@augustcellars.com>, Carsten Bormann <cabo@tzi.org>, jose@ietf.org
References: <12DD2F97-80C3-4606-9C6B-03F7A4BF19DE@gmail.com> <8436AEE7-B25A-4538-B8F6-16D558D9A504@gmail.com> <MEAPR01MB35428606C09BF315DE04CC79E5E10@MEAPR01MB3542.ausprd01.prod.outlook.com> <CAHbuEH6DCD7Zc+PK3TnCBkKv1esnROwyCcDb8ZR+TKwgQQ+yXQ@mail.gmail.com> <0E6BD488-74D5-4640-BC31-5E45B0531AFC@gmail.com> <CAHbuEH5oH-Km6uAjrSr0pEHswFBLuDpfVweQ+gpj472yk+8iTQ@mail.gmail.com> <073CB50F-8D91-4EF6-90BE-FC897D557AA6@oracle.com> <A37D69B1-6B77-4E11-8BB9-A0209C77752C@tzi.org> <434fbdb6-0202-5a02-4cec-9332fbbe548c@gmail.com> <FBBFA6FA-4B0C-4239-9145-0B713120EC98@tzi.org> <01fd01d47f5f$4c4889f0$e4d99dd0$@augustcellars.com> <7b1d293c-1d97-44e4-0cd8-55ec1db6c3b5@gmail.com> <AD2DB2EB-3F06-4C55-94E4-CED60F6FF4CF@alkaline-solutions.com> <CADEL5zvbLOtuFBD6zgEpcUQZ2Y7hNYHxLcj=EhkEOnV-_dqwJQ@mail.gmail.com> <E7458037-AC7A-4C84-870F-9BDAEA420357@gmail.com> <600798e5-21b4-2ca2-44f2-3702d6aeb4c0@gmail.com> <C15EAFFA-1AC6-46DC-A5A1-68C666CB1241@gmail.com>
From: Anders Rundgren <anders.rundgren.net@gmail.com>
Message-ID: <aeb42ec2-5951-e8d0-ebfc-3e15c839545e@gmail.com>
Date: Sat, 24 Nov 2018 08:16:26 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.3.1
MIME-Version: 1.0
In-Reply-To: <C15EAFFA-1AC6-46DC-A5A1-68C666CB1241@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/399Ks54JOn63znWxVfmz0dfgFI0>
Subject: Re: [jose] Canonical JSON form
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Nov 2018 07:16:35 -0000

Since Open Banking's use of clear text signatures (enabled through HTTP
bindings and the downsides of that [1]), TEEP/OTrP's need for clear
text object type IDs (and the implications of that with respect to
signature validation [2]), as well as my own use of a hash only in a
novel counter signature scheme [3], haven't spurred a single comment
relating to the actual applications and how they {c|sh}ould make best
use of the existing or enhanced JOSE stack, there seems to be little
point continuing these discussions within the IETF.

I'm still waiting for messages pointing out why JCS isn't working
(beyond anecdotes from the XML/WS* era).  Since detached JWS signatures
is already a de-facto standard in Open Banking, claims that data to be
signed SHOULD be encoded in alien formats and then be embedded in specific
signature containers can safely be ignored unless somebody has a very compelling
security story to share with us.

Anyway, VmWare have a US patent on JSON clear text signatures [6] so maybe
it is toast from that perspective as well?  Although I'm not a patent
lawyer this smells prior art by a mile!  To me it only adds credibility
to the idea since the concepts are virtually identical:-)

 From the CBOR list I have gathered that the CBOR counterpart to JCS [4,5]
apparently is in a pretty bad shape.  Carsten, you have a new job :-)

thanx,
Anders

1] http://lists.openid.net/pipermail/openid-specs-fapi/2018-November/001164.html
2] https://www.ietf.org/mail-archive/web/jose/current/msg05810.html
3] https://www.ietf.org/mail-archive/web/jose/current/msg05811.html
4] https://tools.ietf.org/html/draft-rundgren-json-canonicalization-scheme-01
5] https://mobilepki.org/jws-jcs
6] https://patentimages.storage.googleapis.com/68/be/70/582930ff11703d/US20150341176A1.pdf