Re: [jose] draft revision to JOSE charter

Mike Jones <Michael.Jones@microsoft.com> Fri, 11 January 2013 20:23 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D53B21F86AA for <jose@ietfa.amsl.com>; Fri, 11 Jan 2013 12:23:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bTvJdIWypI-i for <jose@ietfa.amsl.com>; Fri, 11 Jan 2013 12:23:37 -0800 (PST)
Received: from NA01-BY2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.23]) by ietfa.amsl.com (Postfix) with ESMTP id 4F7FB21F86B2 for <jose@ietf.org>; Fri, 11 Jan 2013 12:23:37 -0800 (PST)
Received: from BY2FFO11FD008.protection.gbl (10.1.15.200) by BY2FFO11HUB022.protection.gbl (10.1.14.109) with Microsoft SMTP Server (TLS) id 15.0.596.13; Fri, 11 Jan 2013 20:23:35 +0000
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD008.mail.protection.outlook.com (10.1.14.159) with Microsoft SMTP Server (TLS) id 15.0.596.13 via Frontend Transport; Fri, 11 Jan 2013 20:23:34 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.202]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi id 14.02.0318.003; Fri, 11 Jan 2013 20:23:00 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "odonoghue@isoc.org" <odonoghue@isoc.org>, "jose@ietf.org" <jose@ietf.org>
Thread-Topic: [jose] draft revision to JOSE charter
Thread-Index: AQHN8DaxtbAVCN9tdk2Bi7W2bXhFxphEkng2
Date: Fri, 11 Jan 2013 20:22:59 +0000
Message-ID: <4E1F6AAD24975D4BA5B168042967394366A37BC4@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <50F06FEE.9060207@isoc.org>
In-Reply-To: <50F06FEE.9060207@isoc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B168042967394366A37BC4TK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(164054002)(377454001)(479174001)(47976001)(47736001)(54356001)(49866001)(16236675001)(77982001)(53806001)(44976002)(54316002)(56776001)(76482001)(46102001)(74662001)(56816002)(47446002)(31966008)(4396001)(59766001)(74502001)(55846006)(16406001)(51856001)(5343655001)(512954001)(33656001)(79102001)(50986001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB022; H:TK5EX14HUBC103.redmond.corp.microsoft.com; LANG:en;
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 0723A02764
Subject: Re: [jose] draft revision to JOSE charter
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jan 2013 20:23:38 -0000

+1

________________________________
From: Karen O'Donoghue
Sent: 1/11/2013 12:03 PM
To: jose@ietf.org
Subject: [jose] draft revision to JOSE charter

Folks,

Below is a draft update to our charter based on discussions at the last
IETF meeting. The key changes are adding key representations and
algorithm identifiers to the scope of work. This includes some minor
language updates in the general section, the addition of deliverables
5-8, and the addition and modification of a number of milestones related
to these documents.

In addition, the phrase "using a compact URL-safe representation" has
been added to the descriptions of the first two deliverables and
"compact JSON object" used in the milestones.

Jim and I will be submitting a revised charter shortly, and we would
like your comments by 18 January if possible.

Thanks,
Karen


Description of Working Group

JavaScript Object Notation (JSON) is a text format for the serialization
of structured data described in RFC 4627.  The JSON format is often used
for serializing and transmitting structured data over a network
connection.  With the increased usage of JSON in protocols in the IETF
and elsewhere, there is now a desire to offer security services such as
encryption, digital signatures, message authentication codes (MACs), and
key representations for data that is being carried in JSON format.

Different proposals for providing such security services have already
been defined and implemented.  This Working Group's task is to
standardize four kinds of security services, integrity protection
(signature and MAC), encryption, key representations, and algorithm
identifiers, in order to increase interoperability of security features
between protocols that use JSON.  The Working Group will base its work
on well-known message security primitives (e.g., CMS), and will solicit
input from the rest of the IETF Security Area to be sure that the
security functionality in the JSON format is correct.

This group is chartered to work on eight documents:

(1) A Standards Track document specifying how to apply JSON-structured
integrity protection to data, including (but not limited to) JSON data
structures, using a compact URL-safe representation.  "Integrity
protection" includes public-key digital signatures as well as
symmetric-key MACs.

(2) A Standards Track document specifying how to apply a JSON-structured
encryption to data, including (but not limited to) JSON data structures,
using a compact URL-safe representation.

(3) A Standards Track document specifying how to encode public keys as
JSON-structured objects.

(4) A Standards Track document specifying algorithms and algorithm
identifiers, including mandatory-to-implement algorithms for the
previous three documents.

(5) A Standards Track document specifying how to apply JSON-structured
integrity protection to data, including (but not limited to) JSON data
structures, using a JSON representation supporting multiple recipients.
This document will build upon the concepts and structures in (1).

(6) A Standards Track document specifying how to apply a JSON-structured
encryption to data, including (but not limited to) JSON data structures,
using a JSON representation supporting multiple recipients.  This
document will build upon the concepts and structures in (2).

(7) A Standards Track document specifying how to encode private and
symmetric keys as JSON-structured objects.  This document will build
upon the concepts and structures in (3).

(8) A Standards Track application document specifying a means of
protecting private and symmetric keys via encryption.  This document
will build upon the concepts and structures in (2) and (7).  This
document may register additional algorithms in registries defined by (4).

The working group may decide to address combinations of these goals in
consolidated document(s), in which case the concrete milestones for
these goals will be satisfied by the consolidated document(s).

Goals and Milestones

Jan 2012              Submit compact JSON object integrity document (1)
as a WG item.

Jan 2012              Submit compact JSON object encryption document (2)
as a WG item.

Jan 2012              Submit JSON key format document (3) as a WG item.

Jan 2012              Submit JSON algorithm document (4) as a WG item.

Feb 2013              Start Working Group Last Call on compact JSON
object integrity document (1).

Feb 2013              Start Working Group Last Call on compact JSON
object encryption document (2).

Feb 2013              Start Working Group Last Call on JSON key format
document (3).

Feb 2013              Start Working Group Last Call on JSON algorithm
document (4).

Mar 2013             Submit JSON object integrity document (1) to IESG
for consideration as Standards Track document.

Mar 2013             Submit JSON object encryption document (2) to IESG
for consideration as Standards Track document.

Mar 2013             Submit JSON key format document (3) to IESG for
consideration as Standards Track document.

Mar 2013             Submit JSON algorithm document (4) to IESG for
consideration as Standards Track document.

Mar 2013             Submit multi-recipient JSON object integrity
document (5) as a WG item.

Mar 2013             Submit multi-recipient JSON object encryption
document (6) as a WG item.

Mar 2013             Submit JSON private and symmetric key document (7)
as a WG item.

Mar 2013             Submit JSON key protection application document (8)
as a WG item.

Jun 2013              Start Working Group Last Call on multi-recipient
JSON object integrity document (5).

Jun 2013              Start Working Group Last Call on multi-recipient
JSON object encryption document (6).

Jun 2013              Start Working Group Last Call on JSON private and
symmetric key document (7).

Jun 2013              Start Working Group Last Call on JSON key
protection application document (8).

Jul 2013               Submit multi-recipient JSON object integrity
document (5) to IESG for consideration as Standards Track document.

Jul 2013               Submit multi-recipient JSON object encryption
document (6) to IESG for consideration as Standards Track document.

Jul 2013               Submit JSON private and symmetric key document
(7) to IESG for consideration as Standards Track document.

Jul 2013               Submit JSON key protection application document
(8) to IESG for consideration as Standards Track document.

_______________________________________________
jose mailing list
jose@ietf.org
https://www.ietf.org/mailman/listinfo/jose