Re: [jose] New Version Notification for draft-barnes-jose-jsms-00.txt

Matt Miller <mamille2@cisco.com> Wed, 27 June 2012 00:46 UTC

Return-Path: <mamille2@cisco.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCD7111E80F5 for <jose@ietfa.amsl.com>; Tue, 26 Jun 2012 17:46:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.999
X-Spam-Level:
X-Spam-Status: No, score=-9.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_47=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qU8wt3-l2qM9 for <jose@ietfa.amsl.com>; Tue, 26 Jun 2012 17:46:32 -0700 (PDT)
Received: from mtv-iport-2.cisco.com (mtv-iport-2.cisco.com [173.36.130.13]) by ietfa.amsl.com (Postfix) with ESMTP id B4E7D11E808D for <jose@ietf.org>; Tue, 26 Jun 2012 17:46:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=mamille2@cisco.com; l=11300; q=dns/txt; s=iport; t=1340757992; x=1341967592; h=subject:mime-version:from:in-reply-to:date:cc:message-id: references:to:content-transfer-encoding; bh=G8V26zwO+p+tClaPClWQfIjdSdKlwIoKHDsvS9uahQQ=; b=kAOD1m9sokVTP4mhf9OmMUAlw0nFsAjZw5T6jtriCDBPmtQSFoBUVmsu y19SKCC/6d8wvrKmDGgBCSsc7CTEK66WKacTeaqpLtwkYg2AhJamt5I0N kXAMu1jQpQU8GFSeCRsxZm2KKFGdsm4Ue3a6eBKolMYxlmDycCxBAcv/6 E=;
X-Files: smime.p7s, PGP.sig : 2214, 535
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av8EAOtW6k+rRDoH/2dsb2JhbABFtjeBB4IYAQEBAwEBAQEPAVsJAgUHBAsOAwQBAQEnBwIlHwkIBhMbB4dkBAyZJaA5izeFKmADiEqFfYZrgRKNC4Fmgn4
X-IronPort-AV: E=Sophos; i="4.77,481,1336348800"; d="sig'?p7s'?scan'208"; a="50283425"
Received: from mtv-core-2.cisco.com ([171.68.58.7]) by mtv-iport-2.cisco.com with ESMTP; 27 Jun 2012 00:46:32 +0000
Received: from sjc-vpn6-1633.cisco.com (sjc-vpn6-1633.cisco.com [10.21.126.97]) by mtv-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id q5R0kVDL006401; Wed, 27 Jun 2012 00:46:31 GMT
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: multipart/signed; protocol="application/pgp-signature"; micalg="pgp-sha1"; boundary="Apple-Mail-2--473945742"
From: Matt Miller <mamille2@cisco.com>
In-Reply-To: <00f601cd53ed$ad6eb280$084c1780$@augustcellars.com>
Date: Tue, 26 Jun 2012 18:46:30 -0600
Message-Id: <C3DDD564-6820-4C6F-AFF7-6C1A8B529146@cisco.com>
References: <4E1F6AAD24975D4BA5B168042967394366569B1D@TK5EX14MBXC283.redmond.corp.microsoft.com> <57BD4255-754D-4B6D-A194-587243FF17F3@bbn.com> <00f601cd53ed$ad6eb280$084c1780$@augustcellars.com>
To: Jim Schaad <ietf@augustcellars.com>
Content-Transfer-Encoding: 7bit
X-Pgp-Agent: GPGMail 1.3.3
X-Mailer: Apple Mail (2.1084)
Cc: 'John Bradley' <ve7jtb@ve7jtb.com>, "'Richard L. Barnes'" <rbarnes@bbn.com>, 'Mike Jones' <Michael.Jones@microsoft.com>, 'Brian Campbell' <bcampbell@pingidentity.com>, jose@ietf.org
Subject: Re: [jose] New Version Notification for draft-barnes-jose-jsms-00.txt
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Jun 2012 00:46:34 -0000

On Jun 26, 2012, at 16:47, Jim Schaad wrote:

> <no hat>
> 
> Note that with my proposal this is somewhat easier.  Also given that we are
> dealing with garbage collection systems it is likely that this data has not
> yet disappeared from memory anyway as long as it is referenced.  The header
> information is not going to be megabytes in size and all of that processing
> on the headers can be done before you hash and decode the body.
> 

The simplicity of JSON means its appeal is well beyond JavaScript; assuming there is always a garbage collector is not valid in my opinion.

However, I also don't think keeping an extra reference to base64url-encoded data is prohibitively expensive.  It might be (slightly) more error-prone on the implementor, but again I do not think is it prohibitively so.


- m&m

Matt Miller - <mamille2@cisco.com>
Cisco Systems, Inc.

/me continues goes back to ignoring that other thread (-:

> Jim
> 
> 
>> -----Original Message-----
>> From: jose-bounces@ietf.org [mailto:jose-bounces@ietf.org] On Behalf Of
>> Richard L. Barnes
>> Sent: Tuesday, June 26, 2012 3:21 PM
>> To: Mike Jones
>> Cc: John Bradley; Brian Campbell; jose@ietf.org
>> Subject: Re: [jose] New Version Notification for draft-barnes-jose-jsms-
>> 00.txt
>> 
>> Sure, multiple signature is easier than multiple recipients.  But I
> wouldn't call
>> it simple.  I have to base64url-decode each header to figure out which one
> to
>> use (but keep around the encoded version, so I can verify the signature),
>> keep track of the corresponding signature value, and reconstruct the
> signed
>> body -- all before I can do the actual signature verification.
>> 
>> OTOH, without integrity-protection, you can just have the signature beside
>> all the other parameters, in plain JSON, so that you can just grab stuff
> and go.
>> 
>> From <https://raw.github.com/bifurcation/jsms/master/jose.js>:
>> 
>>    verify: function(object) {
>>        var jsms = JSON.parse(object);
>>        if (!_JOSE_Support.isSignedData(jsms)) {
>>            throw "Invalid SignedData object";
>>        }
>> 
>>        // Figure out which signatures are valid
>>        var validPublicKeys = [];
>>        var sigs = jsms.signatures;
>>        for (var i=0; i<sigs.length; ++i) {
>>            var result = _JOSE_Crypto.verify_pkcs1_sha256(
>>                sigs[i].key.n, sigs[i].key.e, jsms.content,
> sigs[i].signature)
>>            if (result = "True") {
>>                validPublicKeys.push(sigs[i].key);
>>            }
>>        }
>> 
>>        return validPublicKeys;
>>    }
>> 
>> 
>> 
>> 
>> On Jun 26, 2012, at 6:03 PM, Mike Jones wrote:
>> 
>>> http://tools.ietf.org/html/draft-jones-json-web-signature-json-
>> serialization-01 is an existence proof that it's not hard to sign the
> parameters
>> and have multiple signatures.
>>> 
>>> 				-- Mike
>>> 
>>> -----Original Message-----
>>> From: jose-bounces@ietf.org [mailto:jose-bounces@ietf.org] On Behalf
>>> Of Richard L. Barnes
>>> Sent: Tuesday, June 26, 2012 10:46 AM
>>> To: Brian Campbell
>>> Cc: John Bradley; jose@ietf.org
>>> Subject: Re: [jose] New Version Notification for
>>> draft-barnes-jose-jsms-00.txt
>>> 
>>> I agree with that goal!  I disagree that JWS is a good solution.
>>> 
>>> It is true that JWS provides a relatively simple mechanism for a single
>> signature, but:
>>> 1. It could be simpler (see below)
>>> 2. JWS header protection is useless for the single-signature case, and
>>> makes the multiple-signature/recipient case harder
>>> 
>>> --Richard
>>> 
>>> 
>>> 
>>> On Jun 26, 2012, at 12:16 PM, Brian Campbell wrote:
>>> 
>>>> I wasn't suggesting that integrity-protecting the header itself makes
>>>> things simpler. Rather that a desirable goal is for support of a
>>>> relatively simple model utilizing a single signature over the whole
>>>> message. And that we already have that in JWS.
>>>> 
>>>> On Mon, Jun 25, 2012 at 3:55 PM, Richard L. Barnes <rbarnes@bbn.com>
>> wrote:
>>>>> 
>>>>> On Jun 25, 2012, at 5:53 PM, Richard L. Barnes wrote:
>>>>> 
>>>>>>>> I think part of this is that as one of the openID Connect authors I
> look
>> at this as a necessary security token format, for OAuth and Connect.
>>>>>>>> For that simple processing with one signature is a high priority
> for
>> adoption.
>>>>>>> 
>>>>>>> +1.
>>>>>>> 
>>>>>>> A simple JSON friendly model supporting a single signature over
>>>>>>> the entire message (including headers) is an important case for
>>>>>>> adoption (and security). JWS provides that now and there are
>>>>>>> already numerous interoperable JWS implementations available or in
>> the works.
>>>>>> 
>>>>>> I'm not sure how people think that integrity-protecting the header
>> makes things *simpler*, especially since it adds a whole new decoding step
>> and makes the parsing more complicated.
>>>>>> 
>>>>>> Pseudocode without integrity protection (assuming JSMS format, but
>> JWS could be made to look similar):
>>>>>> function verify(json) {
>>>>>>  jose = JSON.parse(json);
>>>>>>  // Check algorithm values
>>>>>>  return Crypto.SignatureAlgorithm.verify(jose.content,
>>>>>> jose.keys[0].signature, jose.keys[0].key); }
>>>>>> 
>>>>>> Pseudocode with integrity protection (assuming JWS format):
>>>>>> function verify(jws) {
>>>>>>  (txtHeader, content, signature) = jws.split("\.");
>>>>>>  protectedBody = header + "." + content
>>>>>>  jsonHeader = base64url.decode(txtHeader);
>>>>>>  header = JSON.parse(jsonHeader);
>>>>>>  return Crypto.SignatureAlgorithm.verify(content, signature,
>>>>>> header.jwk); }
>>>>>> 
>>>>> 
>>>>> Err, sorry, that should read:
>>>>>  protectedBody = txtHeader + "." + content; and
>>>>>  return Crypto.SignatureAlgorithm.verify(protectedBody, signature,
>>>>> header.jwk);
>>>>> 
>>>>> See how hard it is to get right?  :)
>>>>> 
>>>>> --Richard
>>>> _______________________________________________
>>>> jose mailing list
>>>> jose@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/jose
>>> 
>>> _______________________________________________
>>> jose mailing list
>>> jose@ietf.org
>>> https://www.ietf.org/mailman/listinfo/jose
>>> 
>>> 
>>> _______________________________________________
>>> jose mailing list
>>> jose@ietf.org
>>> https://www.ietf.org/mailman/listinfo/jose
>> 
>> _______________________________________________
>> jose mailing list
>> jose@ietf.org
>> https://www.ietf.org/mailman/listinfo/jose
> 
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose