[jose] Benoit Claise's No Objection on draft-ietf-jose-jws-signing-input-options-07: (with COMMENT)

"Benoit Claise" <bclaise@cisco.com> Wed, 16 December 2015 22:11 UTC

Return-Path: <bclaise@cisco.com>
X-Original-To: jose@ietf.org
Delivered-To: jose@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B8F21A8A1B; Wed, 16 Dec 2015 14:11:23 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Benoit Claise <bclaise@cisco.com>
To: The IESG <iesg@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.11.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151216221123.7663.35723.idtracker@ietfa.amsl.com>
Date: Wed, 16 Dec 2015 14:11:23 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/jose/7gYDTeokU4NClacwvqCE_txHtc0>
Cc: jose-chairs@ietf.org, stefan.winter@restena.lu, ietf@augustcellars.com, mbj@microsoft.com, draft-ietf-jose-jws-signing-input-options@ietf.org, jose@ietf.org
Subject: [jose] Benoit Claise's No Objection on draft-ietf-jose-jws-signing-input-options-07: (with COMMENT)
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Dec 2015 22:11:23 -0000

Benoit Claise has entered the following ballot position for
draft-ietf-jose-jws-signing-input-options-07: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-jose-jws-signing-input-options/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

As mentioned by Stefan in his OPS DIR review:
There are coexistence issues between implementations which understand
the notion of the "b64" parameter (i.e. implementing this RFC) and those
who do not (i.e. all existing JWS implementations).
The issues are discussed in Security Considerations (second para up
until the end). The issues with it are:

* the conclusions are not as satisfactory as they could be.
Interoperability is either

 - left as an out-of-band and undescribed mechanism ("make sure that
only supporting implementations talk to each other")
 - by explicitly marking support for b64 as critical (IMO the only good
solution)
 - modifying the payload so that it contains unparseable characters
(which may or may not be possible for the sender depending on the
payload characteristics)

* this is placed in Security Considerations while it has actual
operational impact on every transmitted message: in essence it states:
"Sometimes, sender and recipient may misunderstand each other without
noticing". Example given in the draft where the actual message is "NDA1"
while the recipient thinks it was told "405", without a way to notice.
Even if the misunderstanding is not related to security, it can/will
have significant implications for the application.

I believe this can not be left as-is. Luckily, there seems to be an easy
way out:

"Whenever the 'b64' header exists and is set to false, the 'crit' header
MUST also be present and contain 'b64'."

This, maybe in conjunction with

"When the content is intended to be base64 encoded, the 'b64' header
SHOULD NOT be present."

This would make sure that implementations who know nothing of b64 are
left alone (there is no unknown extension, there is no criticality in
any such extension, and the sender did not intend to make use of the
feature => all good). While at the same time for unencoded payloads
making deterministically clear that unencoded transmission is happening,
and is required to be understood.

This would at the same time make a complex piece of Sec Con go away.