Re: [jose] Canonical JSON form

Samuel Erdtman <samuel@erdtman.se> Mon, 05 November 2018 18:52 UTC

Return-Path: <samuel@erdtman.se>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121CC1294D7 for <jose@ietfa.amsl.com>; Mon, 5 Nov 2018 10:52:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=erdtman-se.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ny1l7CxzeTuF for <jose@ietfa.amsl.com>; Mon, 5 Nov 2018 10:52:28 -0800 (PST)
Received: from mail-pl1-x642.google.com (mail-pl1-x642.google.com [IPv6:2607:f8b0:4864:20::642]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7135F130E00 for <jose@ietf.org>; Mon, 5 Nov 2018 10:52:28 -0800 (PST)
Received: by mail-pl1-x642.google.com with SMTP id n4-v6so4896488plp.2 for <jose@ietf.org>; Mon, 05 Nov 2018 10:52:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=erdtman-se.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=C2rab7cmR1nEbJC/IfrAflo1ttIh9OWK3VtiGH8dFLg=; b=ToRdZR8QaU16LiDo1XMPe5AN3xtZRL4GXtqVd4WexhvhW4ZBtpnLFV3fWIRzazeolO u0+nUvuKI2dJLG6FnY0WM9PiU00oQ/hDByJoNVJAe3XTAyCsS90KiCi99BOyljQYqvFY QOn8AdNNIxf/SfMDFSN0dCH9tk7vEYA7s/e5VVrwSZYaF+cA04xV4oMqQlMQmSIX9Hsd t3mNmAIwspX7fW7QpXHD9fscm2ybodz4OqzZRkZXeQKzThyc0Pgtaaz8dPTodkNY1Fv8 YeH7XxZmtL8PyoIalhrCOcfQ2s7Gq2UNQa3fkywowouK343d29XTCiPugTRuFQxjcfLq ByVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=C2rab7cmR1nEbJC/IfrAflo1ttIh9OWK3VtiGH8dFLg=; b=A/4G0V43kL1HAF4Y0a1IjlSaMKc7T4InQPDdhcdh108WelEuloNiBAJtL0CH863ATQ Efr7E0vM8W1gNTBYznJLWrZj67X2lGSskZaf8R9dM3pUoez1dVl3C9L72Ep7T4FOUBMu xmlVoPqNN/M0MWPPcRsPLRhO7V1Mr6AYbFi1adnSvVwmzIWVsWbIHHe2fKvBMO7nc277 F4J4yOn4DoYVvqMEUig7EnFOCIddHZcFnaxvrexFEDkGXQApVYz3KY1apQqRAhIiAeBM JCLMy5xejkK2pKKel17cTLRIydOlerp9oXmMempgc/dIcivOJfuCpv3FFhehG93XaEl2 zbsQ==
X-Gm-Message-State: AGRZ1gKMc2qpu80V7gng/V0cw4RU6HvXsbE6wR9iv+yPPVWENcoBzMii 7T74KFvp8pZ+0LPyWPqMNrxXKa0HJC+5zkdZWDJZrQ==
X-Google-Smtp-Source: AJdET5f3To5CqQCYDF8WosIaveDE77brMq9W/3QBi3WPy4nfi/i5Ltj4UvzJIpFxN1aCAwmbNXxcwkyni63spxrLhZ0=
X-Received: by 2002:a17:902:8e8a:: with SMTP id bg10-v6mr23389810plb.214.1541443947599; Mon, 05 Nov 2018 10:52:27 -0800 (PST)
MIME-Version: 1.0
References: <12DD2F97-80C3-4606-9C6B-03F7A4BF19DE@gmail.com> <CAHbuEH6DCD7Zc+PK3TnCBkKv1esnROwyCcDb8ZR+TKwgQQ+yXQ@mail.gmail.com> <0E6BD488-74D5-4640-BC31-5E45B0531AFC@gmail.com> <CAHbuEH5oH-Km6uAjrSr0pEHswFBLuDpfVweQ+gpj472yk+8iTQ@mail.gmail.com> <073CB50F-8D91-4EF6-90BE-FC897D557AA6@oracle.com> <A37D69B1-6B77-4E11-8BB9-A0209C77752C@tzi.org> <45bf6c0f-e510-4afc-4277-bdd486a8ce8c@gmail.com> <213796DB-D875-46B0-9F3C-1A56F9E154BA@gmail.com> <ff1dcd4e-2bf4-b85b-dde3-2cc8fe29fb17@gmail.com> <447AB837-7208-4A96-91CC-89D30A2734FA@gmail.com> <24cc6bb7-ea40-1a9c-8847-8d6c74131587@gmail.com> <92B9F9AF-BBCA-472D-9155-935F695CE7CE@gmail.com> <3b6a338b-5588-deb2-9a9c-23e0cc24a2f1@gmail.com> <FE6C1732-D16A-4D97-99F4-1350AF23A748@alkaline-solutions.com> <1B3A97D9-06BE-4225-BF8D-DE55C7FBF2DF@tzi.org> <CAF2hCbaPEdULLX41DeA_RMePZostcM46_eimQoR-NeE-JveHzg@mail.gmail.com> <2c5aa692-3458-b36f-23ae-c56d41deeff1@gmail.com> <CAHBU6isO0Z0E9HihgGJuEykWpgpq0j=YReMFT=9U1Nd+F7dWog@mail.gmail.com> <9c7361de-8591-db6a-6d27-d33de7a1fa08@gmail.com> <5E2A6E0A-970D-42F1-B536-DB2C064325A2@gmail.com>
In-Reply-To: <5E2A6E0A-970D-42F1-B536-DB2C064325A2@gmail.com>
From: Samuel Erdtman <samuel@erdtman.se>
Date: Mon, 5 Nov 2018 19:52:15 +0100
Message-ID: <CAF2hCbbH_RdVOcO9pTZEejNRmhmmMsMAkefFYXqRgTk6k9Zc3w@mail.gmail.com>
To: jordan.ietf@gmail.com
Cc: Anders Rundgren <anders.rundgren.net@gmail.com>, tbray@textuality.com, Carsten Bormann <cabo@tzi.org>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, jose@ietf.org, David Waite <david@alkaline-solutions.com>, James Manger <James.H.Manger@team.telstra.com>, Phil Hunt <phil.hunt@oracle.com>
Content-Type: multipart/alternative; boundary="000000000000f030040579ef627c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/CFB1en-gvouUBorMaSj2FhTnLyA>
Subject: Re: [jose] Canonical JSON form
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Nov 2018 18:52:32 -0000

If a BOF happens in Prague I will try to join.

(Thanks Jim for the concert information on how to move this forward.)

Cheers
//Samuel

On Sat, Nov 3, 2018 at 1:55 PM Bret Jordan <jordan.ietf@gmail.com> wrote:

> I would love to attend the BOF in Prague on this topic.
>
>
> Thanks,
> Bret
> PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
> "Without cryptography vihv vivc ce xhrnrw, however, the only thing that
> can not be unscrambled is an egg."
>
> On Nov 3, 2018, at 11:52 AM, Anders Rundgren <
> anders.rundgren.net@gmail.com> wrote:
>
> On 2018-10-29 14:38, Tim Bray wrote:
>
> I like Samuel Erdtman's idea of starting with an open-source
> implementation.  If I see one of those, with a convincing set of test
> cases, I'd be inclined to make the case for spinning up a working group.
> The argument isn't "Would it be useful?" it's "Can it be done?" So, start
> by proving it can.
>
>
> Things are progressing:
> https://github.com/dotnet/coreclr/pull/20707#issuecomment-435536433
> A coming version of the .NET platform should then be fully compatible with
> the proposed scheme.
>
> Anyway, since there are two quite distinct ways of addressing this topic,
> I'm thinking about a BoF session in Prague as a possible next step.
>
> WDYT?
>
> Anders
>
> On Mon., Oct. 29, 2018, 1:33 a.m. Anders Rundgren <
> anders.rundgren.net@gmail.com <mailto:anders.rundgren.net@gmail.com>
> wrote:
>    On 2018-10-28 21:32, Samuel Erdtman wrote:
>     > In my opinion we can create a good canonicalization format for JSON
> to be used to sign cleartext JSON.
>     >
>     > As can be seen on this list many are skeptical so my approach would
> be to publish easy to use open source implementations.
>    Yes, and part of that is supplying test data like:
> https://github.com/cyberphone/json-canonicalization/tree/master/testdata
>    The Microsoft folks developing "Chakra" (their JS engine) already use
> the 100 million reference values.
>     > If we do that and there is real interest then we might be able to
> convince people here about the need. In line with this ambition I have done
> the JS and Java publications. This might also show there is no actual
> interest and then that is also an outcome.
>    Well, another part of the standards puzzle is getting early work into
> real products and services.
>    FWIW, I'm personally involved in a couple of efforts using clear text
> JSON signatures:
>    - Saturn, an open payment authorization scheme based on an enhanced
> "four corner" trust model which aims giving banks an upper hand against
> Apple Pay, Google Pay, PayPal, etc.
>    - Mobile ID, an open, PKI-based, multi-issuer mobile authentication and
> signature solution for e-governments.
>    Regards,
>    Anders
>     > Best regards
>     > //Samuel
>     >
>     >
>     > On Mon, Oct 22, 2018 at 8:44 AM Carsten Bormann <cabo@tzi.org
> <mailto:cabo@tzi.org> <mailto:cabo@tzi.org <mailto:cabo@tzi.org>>> wrote:
>     >
>     >     On Oct 22, 2018, at 04:47, David Waite <
> david@alkaline-solutions.com <mailto:david@alkaline-solutions.com>
> <mailto:david@alkaline-solutions.com <mailto:david@alkaline-solutions.com>>>
> wrote:
>     >      >
>     >      > intermittent interoperability failures until a new language
> runtime release which revises the numerical print and parse functions
>     >
>     >     Note that this is not a theoretical concern, as CVE-2010-4476
> and CVE-2010-4645 amply demonstrate, nicely underscored by the
> re-occurrence of the latter in
> https://www.exploringbinary.com/php-converts-2-2250738585072012e-308-incorrectly/
>     >
>     >     Grüße, Carsten
>     >
>     >     _______________________________________________
>     >     jose mailing list
>     > jose@ietf.org <mailto:jose@ietf.org> <mailto:jose@ietf.org <mailto:
> jose@ietf.org>>
>     > https://www.ietf.org/mailman/listinfo/jose
>     >
>    _______________________________________________
>    jose mailing list
>    jose@ietf.org <mailto:jose@ietf.org>
>    https://www.ietf.org/mailman/listinfo/jose
>
>
>
>