Re: [jose] sector review of draft-ietf-jose-jwk-thumbprint-05

Mike Jones <Michael.Jones@microsoft.com> Wed, 24 June 2015 17:49 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 847AF1A90F4; Wed, 24 Jun 2015 10:49:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HqXqf7r_M7kk; Wed, 24 Jun 2015 10:49:14 -0700 (PDT)
Received: from na01-bn1-obe.outbound.protection.outlook.com (mail-bn1on0741.outbound.protection.outlook.com [IPv6:2a01:111:f400:fc10::741]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58F8F1A90C8; Wed, 24 Jun 2015 10:49:14 -0700 (PDT)
Received: from BY2PR03MB442.namprd03.prod.outlook.com (10.141.141.145) by BY2PR03MB441.namprd03.prod.outlook.com (10.141.141.142) with Microsoft SMTP Server (TLS) id 15.1.201.16; Wed, 24 Jun 2015 17:49:09 +0000
Received: from BY2PR03MB442.namprd03.prod.outlook.com ([10.141.141.145]) by BY2PR03MB442.namprd03.prod.outlook.com ([10.141.141.145]) with mapi id 15.01.0201.000; Wed, 24 Jun 2015 17:49:09 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "Adam W. Montville" <adam.w.montville@gmail.com>
Thread-Topic: sector review of draft-ietf-jose-jwk-thumbprint-05
Thread-Index: AQHQogJgaphBjlti2Uu758g0GQEF3p2nztYwgAD9kwCAEC+K8IAACaYAgAJomRCAADu4AIAAWqTQ
Date: Wed, 24 Jun 2015 17:49:09 +0000
Message-ID: <BY2PR03MB4421B3C0A9973108C1F7B6AF5AF0@BY2PR03MB442.namprd03.prod.outlook.com>
References: <A1BD2DB0-A7D9-4635-8A3B-074303AF2E55@gmail.com> <BY2PR03MB442BD780448D808BA10D657F5BC0@BY2PR03MB442.namprd03.prod.outlook.com> <4CA0A65D-E5FD-408C-A6B9-6ECB12A81B7C@gmail.com> <BY2PR03MB44292335834F3354309E062F5A10@BY2PR03MB442.namprd03.prod.outlook.com> <E56D5AB3-AEA0-4E49-BADD-D7F86AA0BAFB@gmail.com> <BY2PR03MB44275C31276DFF36611D67DF5AF0@BY2PR03MB442.namprd03.prod.outlook.com> <C123F274-D6EA-4072-AE9C-5E6E11065C4E@gmail.com>
In-Reply-To: <C123F274-D6EA-4072-AE9C-5E6E11065C4E@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;
x-originating-ip: [50.47.90.173]
x-microsoft-exchange-diagnostics: 1; BY2PR03MB441; 5:T5XR2Z6cg1XHw5E9RoOhGEuEiYhj0B9jxOZjEKEQOXkRcdiOCVdguv9VmPPAsTgqSLmWPE1KweYYtS3laVjehJldiWR1rHmyGDCpBFk8grZJIXIJKdrlo8S9DRfEyPeKbJcZzeT9CJs11ca9IaC8Jg==; 24:6ZnGb7rtnUxftR+wJXtG9MzSJjw0lhDfQHcwNHEi8gskS7ZxZ0sdXCCoWjeIE3ZJ7t/QEQ28UDuslthlcGwm7ELOumeQKF9cPKu9rJBg2UE=; 20:AjAVzixk2GG1LZOI0gBx8Qjp1/KD2M9IUqv/8SyGQvPA56Ow+X/OIQv8mpLnSlaJFMPOuMT7NaAkHfLiUGySkw==
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY2PR03MB441;
x-microsoft-antispam-prvs: <BY2PR03MB4417D8CFEDCCE1FEF7899DDF5AF0@BY2PR03MB441.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(2401001)(5005006)(3002001); SRVR:BY2PR03MB441; BCL:0; PCL:0; RULEID:; SRVR:BY2PR03MB441;
x-forefront-prvs: 061725F016
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(377454003)(24454002)(51914003)(43784003)(71364002)(46102003)(19625215002)(2656002)(54356999)(87936001)(76576001)(33656002)(40100003)(230783001)(86362001)(16236675004)(74316001)(5003630100001)(5003600100002)(92566002)(106116001)(19580405001)(19300405004)(19580395003)(99286002)(62966003)(77156002)(76176999)(5002640100001)(93886004)(19617315012)(77096005)(66066001)(15975445007)(102836002)(50986999)(86612001)(5001920100001)(110136002)(5001960100002)(189998001)(2900100001)(122556002)(2950100001); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR03MB441; H:BY2PR03MB442.namprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
Content-Type: multipart/alternative; boundary="_000_BY2PR03MB4421B3C0A9973108C1F7B6AF5AF0BY2PR03MB442namprd_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jun 2015 17:49:09.1173 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR03MB441
Archived-At: <http://mailarchive.ietf.org/arch/msg/jose/9IkP554FL_hmb_YVwbYH6DUlyzM>
Cc: "draft-ietf-jose-jwk-thumbprint.all@ietf.org" <draft-ietf-jose-jwk-thumbprint.all@ietf.org>, The IESG <iesg@ietf.org>, "jose@ietf.org" <jose@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>
Subject: Re: [jose] sector review of draft-ietf-jose-jwk-thumbprint-05
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jun 2015 17:49:18 -0000

Hi Adam,

I take your point that the paragraph would seem simpler without the last sentence, but I’d rather err on the side of giving readers more information than less.  While in many cases knowledge of the hash function used need not be propagated (per the example in the beginning of the paragraph), sometimes it does.  So Nat and I decided to also include a sentence about when it does.  Per the previous paragraph, which hash function to use is an application choice.

From that viewpoint, does the current paragraph work for you, or is there a specific wording change that you’d still like to see?

Thanks again for your review!

                                                            -- Mike

From: Adam W. Montville [mailto:adam.w.montville@gmail.com]
Sent: Wednesday, June 24, 2015 5:12 AM
To: Mike Jones
Cc: The IESG; secdir@ietf.org; draft-ietf-jose-jwk-thumbprint.all@ietf.org; jose@ietf.org
Subject: Re: sector review of draft-ietf-jose-jwk-thumbprint-05

Hi Nat and Mike,

Thanks for your attention on this issue.  I see the following text in section 3.4:

Note that in many cases, only the party that creates a key will need
   to know the hash function used.  A typical usage is for the producer
   of the key to use the base64url-encoded JWK Thumbprint value as a
   "kid" (key ID) value.  The consumer of the "kid" treats it as an
   opaque value that it uses to select the key.  Only if multiple
   parties will be reproducing the JWK Thumbprint calculation for some
   reason, will parties other than the original producer of the JWK
   Thumbprint need to know which hash function was used.


Would it make the draft clearer if that last sentence were omitted?  The way this paragraph reads is such that draft considers and would allow for multiple parties generating key IDs, but then we’re back at not knowing which algorithm was chosen.  If that last sentence were omitted, this would be less of an issue.


On Jun 24, 2015, at 3:40 AM, Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> wrote:

Hi Adam,

Thanks again for your review comments.  https://tools.ietf.org/html/draft-ietf-jose-jwk-thumbprint-06 has been posted to address them.  See sections 3.4 (Selection of Hash Function) and 6 (IANA Considerations).

                                                            Thanks again,
                                                            -- Nat and Mike

From: Kathleen Moriarty [mailto:kathleen.moriarty.ietf@gmail.com]
Sent: Monday, June 22, 2015 12:51 PM
To: Mike Jones
Cc: Adam W. Montville; The IESG; secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-jose-jwk-thumbprint.all@ietf.org<mailto:draft-ietf-jose-jwk-thumbprint.all@ietf.org>; jose@ietf.org<mailto:jose@ietf.org>
Subject: Re: sector review of draft-ietf-jose-jwk-thumbprint-05

Yes, thank you.
Kathleen

Sent from my iPhone

On Jun 22, 2015, at 9:18 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> wrote:
I’d be glad to add the explanation below to the draft and to also include an IANA considerations section that states we are updating the expert review instructions for a registry, as Jim Schaad had suggested.  Chairs and Kathleen, do you want Nat and I to proceed to publish an updated draft?

                                                                -- Mike

From: Adam W. Montville [mailto:adam.w.montville@gmail.com]
Sent: Friday, June 12, 2015 5:07 AM
To: Mike Jones
Cc: The IESG; secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-jose-jwk-thumbprint.all@ietf.org<mailto:draft-ietf-jose-jwk-thumbprint.all@ietf.org>; jose@ietf.org<mailto:jose@ietf.org>
Subject: Re: sector review of draft-ietf-jose-jwk-thumbprint-05


On Jun 11, 2015, at 4:25 PM, Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> wrote:

Hi Adam,

Thanks for the secdir review.




From: Adam W. Montville [mailto:adam.w.montville@gmail.com]
Sent: Monday, June 08, 2015 8:46 AM
To: The IESG; secdir@ietf.org<mailto:secdir@ietf.org>; draft-ietf-jose-jwk-thumbprint.all@ietf.org<mailto:draft-ietf-jose-jwk-thumbprint.all@ietf.org>
Subject: sector review of draft-ietf-jose-jwk-thumbprint-05




Hi,




I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments.

I believe the document is ready with (potential) issues.  The “with issues” might be due to ignorance on my part.  The draft does a very good job of explaining the canonical form of a JSON Web Key that can be used for establishing a thumbprint under varying circumstances, complete with what I found to be helpful examples.

The primary issue I have is that it’s unclear how relying parties are going to know which hash algorithm has been used.  The examples use SHA-256, but I’m not seeing where SHA-256 might be specified as a MUST or even a SHOULD.  Moreover, the example output ultimately shows only the Base-64 encoding of the resulting hash, which says nothing about the algorithm used to identify a key.

Earlier drafts had included fields whose names were intended to communicate the information about the hash function used - see the "jkt" field definitions in http://tools.ietf.org/html/draft-ietf-jose-jwk-thumbprint-01#section-4 - but several working group reviewers suggested that these fields were unnecessary and that the typical usage would be as "kid" (key ID) field values.  With that removal, it falls onto the application to specify the hash algorithm for its particular usage.

This isn't as bad as you might think, however, because typically the consumer of the "kid" doesn't need to know the algorithm because it won't be reproducing the computation.  It just relies on the fact that a unique key ID value was generated for the key and compares "kid" values as opaque strings to find the appropriate key.  In this usage, the producer of the key is the only party that needs to know the hash algorithm that it is using.  I hope this helps.

Yes, this does help, thank you.  It seems like something that could be easily added to the draft to explain why the generating algorithm needn’t be disclosed so that slow folk like myself get the picture straight away.









Additionally, in Section 4, “JSON and Unicode Considerations” some “should”s are used, but I’m not reading them as SHOULDs. Should they be SHOULDs?  For example, the start of the third paragraph in that section: “if new JWK members are defined that use non-ASCII member names, their definitions should specify the exact Unicode code point sequences used to represent them.”  It’s not clear to me whether this is a strong statement or just a recommendation - it seems that this draft could help the future by making stronger statements to encourage future interoperability.

For the other JOSE specifications, our chair Jim Schaad took the position that RFC 2119 keywords should be reserved for testable protocol behaviors and that other uses of the English word "should" should not use "SHOULD".  The authors followed that convention in this document.  I do understand that other authors and working groups have taken different positions in this regard.  If there are particular uses that you still feel should be changed to use RFC 2119 keywords, please call them out.

This is all good, too.  I was simply pointing out that there are “should”s around that may need to be considered as “SHOULD”s. I also see Jim’s (and others’) subsequent notes on the subject, so this is good from my perspective.








Kind regards,
Adam

                                                                Thanks again!
                                                                -- Mike