Re: [jose] TTL for JWK

Prateek Mishra <prateek.mishra@oracle.com> Wed, 20 February 2013 14:54 UTC

Return-Path: <prateek.mishra@oracle.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CBCC21F8726 for <jose@ietfa.amsl.com>; Wed, 20 Feb 2013 06:54:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.561
X-Spam-Level:
X-Spam-Status: No, score=-6.561 tagged_above=-999 required=5 tests=[AWL=0.037, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u39wxkEAbWha for <jose@ietfa.amsl.com>; Wed, 20 Feb 2013 06:54:22 -0800 (PST)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id 2D29921F87DF for <jose@ietf.org>; Wed, 20 Feb 2013 06:54:20 -0800 (PST)
Received: from ucsinet21.oracle.com (ucsinet21.oracle.com [156.151.31.93]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r1KEsJMJ032713 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for <jose@ietf.org>; Wed, 20 Feb 2013 14:54:19 GMT
Received: from acsmt358.oracle.com (acsmt358.oracle.com [141.146.40.158]) by ucsinet21.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r1KEsIx3015943 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <jose@ietf.org>; Wed, 20 Feb 2013 14:54:19 GMT
Received: from abhmt117.oracle.com (abhmt117.oracle.com [141.146.116.69]) by acsmt358.oracle.com (8.12.11.20060308/8.12.11) with ESMTP id r1KEsHOF021155 for <jose@ietf.org>; Wed, 20 Feb 2013 08:54:18 -0600
Received: from [192.168.1.2] (/71.184.95.145) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 20 Feb 2013 06:54:17 -0800
Message-ID: <5124E39C.2030804@oracle.com>
Date: Wed, 20 Feb 2013 09:54:20 -0500
From: Prateek Mishra <prateek.mishra@oracle.com>
Organization: Oracle Corporation
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130107 Thunderbird/17.0.2
MIME-Version: 1.0
To: jose@ietf.org
References: <CA+k3eCTZ4KeC7ZH41OWkjkLCp0RiRBkze=4NpFO7AG5zVq-bJQ@mail.gmail.com>
In-Reply-To: <CA+k3eCTZ4KeC7ZH41OWkjkLCp0RiRBkze=4NpFO7AG5zVq-bJQ@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------080205040203030900030508"
X-Source-IP: ucsinet21.oracle.com [156.151.31.93]
Subject: Re: [jose] TTL for JWK
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Feb 2013 14:54:23 -0000

Shouldn't this be a part of a key management layer distinct from JWK?

I was under the impression that JWK was limited to

[quote]

JavaScript Object Notation (JSON) data
    structure that represents a public key.  This specification also
    defines a JSON Web Key Set (JWK Set) JSON data structure for
    representing a set of JWKs.

[\quote]

- prateek
> I'd like to float the idea of introducing a time to live parameter to 
> the base JWK document, which could probably fit in as a subsection of 
> ยง4 that defines parameters common to all key types [1].
>
> The motivation is that many uses of JWKs will involve caching of JWK 
> data and a TTL parameter could be used to indicate how long a key 
> could be safely cached and used without needing to recheck the JWK 
> source. I don't want it to be a hard expiration date for the key but 
> rather a hint to help facility efficient and error free caching.
>
> OpenID Connect has a real use case for this where entities publish 
> their keys via a JWK Set at an HTTPS URL. To support key rotation and 
> encryption, there needs to be some way to indicate the TTL of a public 
> key used to encrypt. Of course, this isn't the only way to skin that 
> cat but it strikes me as a good way and one that might provide utility 
> for JWK in other contexts.
> JSON Web Token [2] defines a data type that is "A JSON numeric value 
> representing the number of seconds from 1970-01-01T0:0:0Z UTC until 
> the specified UTC date/time" that seems like it could be co-opted to 
> work well as the value for a "ttl" parameter.
>
> [1] http://tools.ietf.org/html/draft-ietf-jose-json-web-key-08#section-4
>
> [2] 
> http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-06#section-2
>
>
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose