Re: [jose] Richard Barnes' Discuss on draft-ietf-jose-json-web-algorithms-33: (with DISCUSS and COMMENT)

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Mon, 03 November 2014 21:38 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C03E1A0AF1; Mon, 3 Nov 2014 13:38:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hbRyXMHGN-9z; Mon, 3 Nov 2014 13:37:59 -0800 (PST)
Received: from mail-lb0-x22d.google.com (mail-lb0-x22d.google.com [IPv6:2a00:1450:4010:c04::22d]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4B131A06FD; Mon, 3 Nov 2014 13:37:58 -0800 (PST)
Received: by mail-lb0-f173.google.com with SMTP id p9so4407877lbv.4 for <multiple recipients>; Mon, 03 Nov 2014 13:37:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=mlVZp8DUG8uDeCIdQ6R44S8bvAZNk3hP10Xg7SoFPCw=; b=KECMgiDCVRjd9Dvry79KJMWywavbxdML9Ya8x/V4PM3lRBSXZAvpL2GkmuQSNww/nj jsSamnZ/TG5osEX2LGXQZl9dl1Pvtx2mCfTi0dOAf2wNVz6+rkJe5p3aHV7R4FYWK0KU 32sEaECZlrAZWNBaNhYnj60DqkpCF791ItPL4Q8AHXzsHciyvXd2WbsDUqsjeFw47np9 dW0UwEZeTB+KaJZVP4T7hgbVRHuhk8tf+mKR4Y7QR/uPFCmdFDSzoiyg7gq4W1yQbQNx Yc2Am7elozkAjv7l4nXUDcQ+XBuyZ6abMyswwZhuxRFq/z5L7gEAzmtjGhKtLAPJd4UL 5S1A==
MIME-Version: 1.0
X-Received: by 10.152.115.131 with SMTP id jo3mr54094957lab.20.1415050676880; Mon, 03 Nov 2014 13:37:56 -0800 (PST)
Received: by 10.112.95.17 with HTTP; Mon, 3 Nov 2014 13:37:56 -0800 (PST)
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739439BB262F4@TK5EX14MBXC286.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739439BB262F4@TK5EX14MBXC286.redmond.corp.microsoft.com>
Date: Mon, 03 Nov 2014 16:37:56 -0500
Message-ID: <CAHbuEH7PFG9ko8KUmDmbfAYk6e04AwEvta=3z7kJJ4nAktV6UQ@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: Richard Barnes <rlb@ipv.sx>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/jose/tDWr9-Dv6oFxfqjN_OCh22uCTPc
Cc: "draft-ietf-jose-json-web-algorithms@tools.ietf.org" <draft-ietf-jose-json-web-algorithms@tools.ietf.org>, Mike Jones <Michael.Jones@microsoft.com>, "jose-chairs@tools.ietf.org" <jose-chairs@tools.ietf.org>, The IESG <iesg@ietf.org>, "jose@ietf.org" <jose@ietf.org>
Subject: Re: [jose] Richard Barnes' Discuss on draft-ietf-jose-json-web-algorithms-33: (with DISCUSS and COMMENT)
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Nov 2014 21:38:01 -0000

Hi Richard,

How does the draft look now, have your discusses been adequately
addressed?  If not all, have some of them been resolved so we can
narrow this down?

Thanks!

On Sat, Oct 25, 2014 at 2:35 AM, Mike Jones <Michael.Jones@microsoft.com> wrote:
> Hi Richard,
>
>
>
> The normative security considerations text for “alg”:“none” has been moved
> into the algorithm definition in the -36 draft, per our agreement below.  I
> also added additional text referencing RFC 3447 in Section 6.3.  Your other
> DISCUSSes were addressed in previous drafts, including making
> RSAES-PKCS1-V1_5 “Recommended-”, per our agreement.  I believe that these
> changes should enable you to clear your remaining DISCUSSes.
>
>
>
>                                                             Thanks again,
>
>                                                             -- Mike
>
>
>
> From: Richard Barnes [mailto:rlb@ipv.sx]
> Sent: Monday, October 20, 2014 8:49 AM
> To: Mike Jones
> Cc: The IESG; jose-chairs@tools.ietf.org;
> draft-ietf-jose-json-web-algorithms@tools.ietf.org; jose@ietf.org
> Subject: Re: [jose] Richard Barnes' Discuss on
> draft-ietf-jose-json-web-algorithms-33: (with DISCUSS and COMMENT)
>
>
>
>
>
>
>
> On Sat, Oct 18, 2014 at 7:09 PM, Mike Jones <Michael.Jones@microsoft.com>
> wrote:
>
>> > > Section 3.6.
>> > > I'm not going to object to "none", even though I think it's a very
>> > > dangerous
>> > > feature because of the risk of confusion between Secured and Unsecured
>> > > JWS.
>> > > But there needs to be stronger guidance:
>> > > 1. An implementation SHOULD NOT support "none" unless the implementer
>> > > knows that it will be used in application context s that require it.
>> > > 2. If an implementation does support "none", then it MUST NOT accept
>> > > it as part
>> > > of generic JWS validation.  Instead, it should require the application
>> > > to explicitly
>> > > signal that an Unsecured JWS is expected for a given validation
>> > > operation.
>> >
>> > As discussed in the working group, your concern about applications
>> > inappropriately allowing the use of "none" actually is an instance of a more
>> > general concern that applications not allow *any* algorithms to be used that
>> > are not appropriate in their application contexts.  This concern is already
>> > addressed in the specification at the end of Section 5.2 as follows:
>> >
>> > "Finally, note that it is an application decision which algorithms are
>> > acceptable in a given context. Even if a JWS can be successfully validated,
>> > unless the algorithm(s) used in the JWS are acceptable to the application,
>> > it SHOULD reject the JWS."
>> >
>> > Since your specific concern is already handled in a more general way, I
>> > would like to request that you withdraw this DISCUSS on that basis.  Also,
>> > you were one of the contributing authors to the security considerations on
>> > this topic in Section 8.5 of JWA (Unsecured JWS Security Considerations), so
>> > it's not clear that there's any cause for you to come back with additional
>> > wording change requests on this topic at this point.
>> >
>> > Thanks for reminding me about Section 8.5.  I think I would be satisfied
>> > here if the contents of Section 8.5 were just moved up to this section.
>> > That way all of the requirements for implementing "none" will be together.
>>
>> Section 3.6 does end with the sentence "See Section 8.5 for security
>> considerations associated with using this algorithm" so implementers are
>> reminded to also pay attention to the security considerations.  If we were
>> to do what you requested, this would be the only algorithm for which the
>> security considerations were included in the algorithm description, rather
>> than in the security considerations section, which would be fairly weird and
>> non-parallel, editorially.
>>
>> Actually, "none" is the only algorithm for which there are additional
>> normative requirements in the Security Considerations.  So it actually seems
>> more sensible to move those requirements up.
>> I'm really just asking for a copy/paste here, shouldn't be invasive.  But
>> I do think the level of indirection creates security risk.
>
> I'm OK moving up the three sentences that actually do contain normative
> requirements.  Those are:
>
>    Implementations that support Unsecured JWS objects MUST NOT accept
>    such objects as valid unless the application specifies that it is
>    acceptable for a specific object to not be integrity-protected.
>    Implementations MUST NOT accept Unsecured JWS objects by default.
>    In order to mitigate downgrade attacks, applications MUST NOT signal
>    acceptance of Unsecured JWS objects at a global level, and SHOULD
>    signal acceptance on a per-object basis.
>
> I'm not OK cluttering up the normative description of the algorithm with the
> discussion text.  Assuming you're OK leaving the discussion text and "for
> example" text in 8.5, I think we have a way forward on this one.  Please let
> me know if that works for you.
>
>
>
> Sounds fine to me.  Thanks for the compromise.
>
> --Richard
>
>
>
>
>> Again, given that you were an author of 8.5 and seemed fine with the
>> resolution after the extensive discussion then, I'd ask you to clear the
>> DISCUSS on that basis and not request that it be reworked again.
>
>                                 -- Mike
>
>



-- 

Best regards,
Kathleen