Re: [jose] AD review of re-charter (was Re: updated JOSE charter sent to IESG)

Mike Jones <Michael.Jones@microsoft.com> Mon, 25 February 2013 21:33 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 921DF21F91A3 for <jose@ietfa.amsl.com>; Mon, 25 Feb 2013 13:33:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.586
X-Spam-Level:
X-Spam-Status: No, score=-2.586 tagged_above=-999 required=5 tests=[AWL=0.012, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TFzeaTSKF+iO for <jose@ietfa.amsl.com>; Mon, 25 Feb 2013 13:33:47 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (na01-by2-obe.ptr.protection.outlook.com [207.46.100.30]) by ietfa.amsl.com (Postfix) with ESMTP id 02B3C21F9100 for <jose@ietf.org>; Mon, 25 Feb 2013 13:33:46 -0800 (PST)
Received: from BY2FFO11FD012.protection.gbl (10.1.15.202) by BY2FFO11HUB024.protection.gbl (10.1.14.138) with Microsoft SMTP Server (TLS) id 15.0.620.12; Mon, 25 Feb 2013 21:33:44 +0000
Received: from TK5EX14MLTC103.redmond.corp.microsoft.com (131.107.125.37) by BY2FFO11FD012.mail.protection.outlook.com (10.1.14.130) with Microsoft SMTP Server (TLS) id 15.0.620.12 via Frontend Transport; Mon, 25 Feb 2013 21:33:44 +0000
Received: from TK5EX14MBXC284.redmond.corp.microsoft.com ([169.254.1.96]) by TK5EX14MLTC103.redmond.corp.microsoft.com ([157.54.79.174]) with mapi id 14.02.0318.003; Mon, 25 Feb 2013 21:33:10 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Sean Turner <turners@ieca.com>, "jose@ietf.org" <jose@ietf.org>
Thread-Topic: [jose] AD review of re-charter (was Re: updated JOSE charter sent to IESG)
Thread-Index: AQHOE55sgB3sCbuLxEqmXSsAIaBES5iLFsEw
Date: Mon, 25 Feb 2013 21:33:09 +0000
Message-ID: <4E1F6AAD24975D4BA5B1680429673943674A6B7F@TK5EX14MBXC284.redmond.corp.microsoft.com>
References: <510AF04B.8060503@isoc.org> <512BD65E.9090306@ieca.com>
In-Reply-To: <512BD65E.9090306@ieca.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.54.51.37]
Content-Type: multipart/alternative; boundary="_000_4E1F6AAD24975D4BA5B1680429673943674A6B7FTK5EX14MBXC284r_"
MIME-Version: 1.0
X-Forefront-Antispam-Report: CIP:131.107.125.37; CTRY:US; IPV:CAL; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(199002)(189002)(51704002)(24454001)(377454001)(479174001)(13464002)(66066001)(31966008)(63696002)(53806001)(65816001)(47446002)(80022001)(74662001)(74502001)(512954001)(55846006)(46102001)(47976001)(47736001)(50986001)(49866001)(51856001)(4396001)(15202345001)(561944001)(76482001)(54316002)(16406001)(56776001)(33656001)(20776003)(56816002)(54356001)(44976002)(79102001)(5343655001)(16236675001)(77982001)(59766001)(5343635001); DIR:OUT; SFP:; SCL:1; SRVR:BY2FFO11HUB024; H:TK5EX14MLTC103.redmond.corp.microsoft.com; RD:InfoDomainNonexistent; A:1; MX:1; LANG:en;
X-OriginatorOrg: microsoft.onmicrosoft.com
X-Forefront-PRVS: 076804FE30
Subject: Re: [jose] AD review of re-charter (was Re: updated JOSE charter sent to IESG)
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Feb 2013 21:33:48 -0000

I mostly agree with this.  I'll quibble with only one point.  By deleting (5) and (6) and leaving (1) and (2) as-is, you're pre-supposing that the existing compact serializations and the JSON serializations get consolidated into combined documents.  If instead, you simply changed the phrase "A Standards Track document specifying how to..." in (1) and (2) to "A Standards Track document or documents specifying how to...", we could get the same effect of having (5) and (6), but without having to pre-decide how the solutions should be allocated between documents.



Would that work for you, Sean?



                                                            -- Mike



-----Original Message-----
From: jose-bounces@ietf.org [mailto:jose-bounces@ietf.org] On Behalf Of Sean Turner
Sent: Monday, February 25, 2013 1:24 PM
To: jose@ietf.org
Subject: [jose] AD review of re-charter (was Re: updated JOSE charter sent to IESG)



I have some comments on the proposed charter that I've embedded below.



On 1/31/13 5:29 PM, Karen O'Donoghue wrote:

> Below is the updated charter that has been submitted to the IESG for

> review. Thank you to all who helped with the process.

>

> Regards,

> Karen

>

> Description of JOSE Working Group

>

> JavaScript Object Notation (JSON) is a text format for the

> serialization of structured data described in RFC 4627.  The JSON

> format is often used for serializing and transmitting structured data

> over a network connection.  With the increased usage of JSON in

> protocols in the IETF and elsewhere, there is now a desire to offer

> security services such as encryption, digital signatures, message

> authentication codes (MACs), and key representations for data that is

> being carried in JSON format.



I don't think of key representations as a security service and maybe I let this through last time but the things listed as services are mechanisms.  In most cases, the services are CIA (confidentiality, integrity, and authentication).  Let's change the last sentence to:



   With the increased usage of JSON in protocols in the IETF

   and elsewhere, there is now a desire to offer security

   services for JSON with encryption, digital signatures,

   and message authentication codes (MACs).



We can add that the key representations are needed later.



> Different proposals for providing such security services have already

> been defined and implemented.  This Working Group's task is to

> standardize four kinds of security services, integrity protection

> (signature and MAC), encryption, key representations, and algorithm

> identifiers, in order to increase interoperability of security

> features between protocols that use JSON.



Not sure a key representations is a service and maybe I'm nitpicking but I think encryption is a mechanism.  Let's do instead:



  The Working Group will standardize the mechanism for integrity

  protection (signature and MAC) and encryption as well as the format

  for keys and algorithm identifiers to support interoperability of

  security services for protocols that use JSON.



> The Working Group

> will base its

> work on well-known message security primitives (e.g., CMS), and will

> solicit input from the rest of the IETF Security Area to be sure that

> the security functionality in the JSON format is correct.



"correct" seems like the wrong word.  How about "sound".



> This group is chartered to work on eight documents:



Let's just drop the # in this sentence and change it to:



   This group is chartered to work on the following deliverables:



> (1) A Standards Track document specifying how to apply JSON-structured

> integrity protection to data, including (but not limited to) JSON data

> structures, including a compact URL-safe representation.  "Integrity

> protection" includes public-key digital signatures as well as

> symmetric-key MACs.

>

> (2) A Standards Track document specifying how to apply a

> JSON-structured encryption to data, including (but not limited to)

> JSON data structures, including a compact URL-safe representation.



Because the IESG will look at the diffs, the addition of "including a compact URL-safe representation" in (1) and (2) as well as the addition of (5) and (6) will no doubt raise questions.



The first will be why are we baking the solution in to the charter?

Based on recent discussions about and revisions to the proposed httpauth charter, baking solutions in or placing constraints on the solution in the form or examples/"includings" in the charters isn't going to fly.

What charters ought to do is say where the WG wants to go and then the drafts say how they're getting there.



The second will obviously be why on earth would a WG solution not support the same kind of basic functionality that the well-known security primitives support.  If the WG decides on more than one serialization/representation is needed for whatever reason, then the drafts can explain why there's more than one.



Based on all of this, bullets 1 and 2 should remain unchanged and 5 and

6 need not be added:



(1) A Standards Track document specifying how to apply JSON-structured integrity protection to data, including (but not limited to) JSON data structures. "Integrity protection" includes public-key digital signatures as well as symmetric-key MACs.



(2) A Standards Track document specifying how to apply a JSON-structured encryption to data, including (but not limited to) JSON data structures.



(3) looks fine.



> (3) A Standards Track document specifying how to encode public keys as

> JSON-

> structured objects.



I like this (4) better because MTI should be specified by the application.



> (4) A Standards Track document specifying algorithms and algorithm

> identifiers for the previous three documents.



As above for 5 and 6.



> (5) A Standards Track document specifying how to apply JSON-structured

> integrity protection to data, including (but not limited to) JSON data

> structures, using a JSON representation supporting multiple

> recipients.  This document will build upon the concepts and structures

> in (1).

>

> (6) A Standards Track document specifying how to apply a

> JSON-structured encryption to data, including (but not limited to)

> JSON data structures, using a JSON representation supporting multiple

> recipients.  This document will build upon the concepts and structures

> in (2).



I think these are fine but I can't really think of a reason to not combine them.



> (7) A Standards Track document specifying how to encode private and



r/7/5



> symmetric

> keys as JSON-structured objects.  This document will build upon the

> concepts and structures in (3).

>

> (8) A Standards Track application document specifying a means of

> protecting



r/8/6



> private and symmetric keys via encryption.  This document will build

> upon the concepts and structures in (2) and (7).  This document may

> register additional algorithms in registries defined by (4).



Is "application" needed in in the first sentence?



>From Karen, we'll also add in:



   (7) An Informational document detailing Use Cases and

   Requirements for JSON Object Signing and Encryption (JOSE).





> The working group may decide to address combinations of these goals in

> consolidated document(s), in which case the concrete milestones for

> these goals will be satisfied by the consolidated document(s).



I want to change this as follows because it's not just the WG's decision:



   One or more of these goals may be combined into a single

   document, in which case the concrete milestones for these

   goals will be satisfied by the consolidated document(s).



We also need some additional wording to explain how JOSE isn't going to specify everything an application/use case needs to achieve complete interop.  I'm basing this on the recent bashing some OAUTH drafts took and the way JOSE seems to be shaping up.  I'd suggest something along the lines of the following to provide additional lead in:



   As JSON adoption expands, the different applications utilizing

   JSON security services will grow and this leads to the need to

   support different requirements. The WG will develop a generic

   syntax that can be used by applications to secure JSON-data,

   but it will be up to the application to fully specify the use

   of the WG's documents much the same way S/MIME is the

   application of CMS to MIME-based media types.



And we need a draft that tells an application all the things that would need to be specified/picked to implement JOSE.  This could go in the use cases or in a new document.  You're call.



spt



_______________________________________________

jose mailing list

jose@ietf.org<mailto:jose@ietf.org>

https://www.ietf.org/mailman/listinfo/jose