Re: [jose] #82: Section 6. Encrypted JWK and Encrypted JWK Set Format

"jose issue tracker" <trac+jose@trac.tools.ietf.org> Mon, 28 October 2013 01:47 UTC

Return-Path: <trac+jose@trac.tools.ietf.org>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABEFD11E8179 for <jose@ietfa.amsl.com>; Sun, 27 Oct 2013 18:47:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sSxCy5viFPSu for <jose@ietfa.amsl.com>; Sun, 27 Oct 2013 18:47:26 -0700 (PDT)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [IPv6:2a01:3f0:1:2::30]) by ietfa.amsl.com (Postfix) with ESMTP id 7067C11E8205 for <jose@ietf.org>; Sun, 27 Oct 2013 18:47:16 -0700 (PDT)
Received: from localhost ([127.0.0.1]:51034 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.80) (envelope-from <trac+jose@trac.tools.ietf.org>) id 1VabvD-0001P1-1Q; Mon, 28 Oct 2013 02:47:11 +0100
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: jose issue tracker <trac+jose@trac.tools.ietf.org>
X-Trac-Version: 0.12.3
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.3, by Edgewall Software
To: draft-ietf-jose-json-web-key@tools.ietf.org, michael.jones@microsoft.com, ietf@augustcellars.com
X-Trac-Project: jose
Date: Mon, 28 Oct 2013 01:47:10 -0000
X-URL: http://tools.ietf.org/jose/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/jose/trac/ticket/82#comment:2
Message-ID: <076.e5fe3ac21be515aa5fdb570631d85104@trac.tools.ietf.org>
References: <061.ed2dc15f379477074fd266a8f9af62ba@trac.tools.ietf.org>
X-Trac-Ticket-ID: 82
In-Reply-To: <061.ed2dc15f379477074fd266a8f9af62ba@trac.tools.ietf.org>
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: draft-ietf-jose-json-web-key@tools.ietf.org, michael.jones@microsoft.com, ietf@augustcellars.com, jose@ietf.org
X-SA-Exim-Mail-From: trac+jose@trac.tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: mbj@microsoft.com
Resent-Message-Id: <20131028014719.7067C11E8205@ietfa.amsl.com>
Resent-Date: Sun, 27 Oct 2013 18:47:16 -0700
Resent-From: trac+jose@trac.tools.ietf.org
Cc: jose@ietf.org
Subject: Re: [jose] #82: Section 6. Encrypted JWK and Encrypted JWK Set Format
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Oct 2013 01:47:26 -0000

#82: Section 6. Encrypted JWK and Encrypted JWK Set Format

Description changed by ietf@augustcellars.com:

Old description:

> A. The existence of private material is not easily identifiable for an
> entity that does not have full and update information on a kty value.
> This means that they either need to not allow them to be processed or
> they need to not worry about the fact that information may be private.
> This can be fixed by defining a JWK element "private" and requiring that
> all private material be placed in that object. This should be evaluated
>
> B. RECOMMENDED is not a protocol requirement and thus should be
> lowercased
>
> C. cty is MUST be used
>
> D. There are no rules specified here for how to convert a JWK to an octet
> string.  This needs to be done.
>
> E. The same items apply to both paragraph #1 and paragraph #2.
>
> F. For simplicity - is there any reason not to require the use of JWK
> Sets when doing the encrypted version.  This seems to be a complication
> that is not especially needed except to make Ryan happy.

New description:

 A. The existence of private material is not easily identifiable for an
 entity that does not have full and update information on a kty value.
 This means that they either need to not allow them to be processed or they
 need to not worry about the fact that information may be private.  This
 can be fixed by defining a JWK element "private" and requiring that all
 private material be placed in that object. This should be evaluated

 * WON'T FIX - did not receive support from the working group.

 B. RECOMMENDED is not a protocol requirement and thus should be lowercased

 C. cty is MUST be used

 * FIXED

 D. There are no rules specified here for how to convert a JWK to an octet
 string.  This needs to be done.

 Clarification on this issue - This item is addressing how to turn the JSON
 object into an octet string for the purposes of encryption.  I.e.
 Serialize as a UTF-8 String.

 E. The same items apply to both paragraph #1 and paragraph #2.

 F. For simplicity - is there any reason not to require the use of JWK Sets
 when doing the encrypted version.  This seems to be a complication that is
 not especially needed except to make Ryan happy.

 * WON'T FIX - it seems overkill but nobody seems to support only doing the
 one thing

--

-- 
-------------------------+-------------------------------------------------
 Reporter:               |       Owner:  draft-ietf-jose-json-web-
  ietf@augustcellars.com |  key@tools.ietf.org
     Type:  defect       |      Status:  new
 Priority:  major        |   Milestone:
Component:  json-web-    |     Version:
  key                    |  Resolution:
 Severity:  -            |
 Keywords:               |
-------------------------+-------------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/jose/trac/ticket/82#comment:2>
jose <http://tools.ietf.org/jose/>