Re: [jose] #27: member names MUST be unique needs additional text

Carsten Bormann <cabo@tzi.org> Thu, 27 June 2013 07:16 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81B7411E80D3 for <jose@ietfa.amsl.com>; Thu, 27 Jun 2013 00:16:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.249
X-Spam-Level:
X-Spam-Status: No, score=-106.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id atdFpSA6GBCz for <jose@ietfa.amsl.com>; Thu, 27 Jun 2013 00:16:39 -0700 (PDT)
Received: from informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) by ietfa.amsl.com (Postfix) with ESMTP id C20A321F9A8B for <jose@ietf.org>; Thu, 27 Jun 2013 00:16:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from smtp-fb3.informatik.uni-bremen.de (smtp-fb3.informatik.uni-bremen.de [134.102.224.120]) by informatik.uni-bremen.de (8.14.4/8.14.4) with ESMTP id r5R7GAUC019075; Thu, 27 Jun 2013 09:16:11 +0200 (CEST)
Received: from [134.102.116.224] (unknown [134.102.116.224]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtp-fb3.informatik.uni-bremen.de (Postfix) with ESMTPSA id CC1283373; Thu, 27 Jun 2013 09:16:10 +0200 (CEST)
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
Content-Type: text/plain; charset="iso-8859-1"
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <255B9BB34FB7D647A506DC292726F6E1151BE456D2@WSMSG3153V.srv.dir.telstra.com>
Date: Thu, 27 Jun 2013 09:16:10 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <EE290511-7365-4815-A99A-481F8699CC37@tzi.org>
References: <061.bb7bbe0b618ec6b74904f48bdb9bb312@trac.tools.ietf.org> <076.a597050ecb4fb25084cec65f7174dc7e@trac.tools.ietf.org> <033b01ce729b$26ff5c90$74fe15b0$@augustcellars.com> <4E1F6AAD24975D4BA5B16804296739436789B4CC@TK5EX14MBXC283.redmond.corp.microsoft.com> <03b401ce72e5$002c65f0$008531d0$@augustcellars.com> <255B9BB34FB7D647A506DC292726F6E1151BE456D2@WSMSG3153V.srv.dir.telstra.com>
To: "Manger, James H" <James.H.Manger@team.telstra.com>
X-Mailer: Apple Mail (2.1508)
Cc: Jim Schaad <ietf@augustcellars.com>, 'Mike Jones' <Michael.Jones@microsoft.com>, "jose@ietf.org" <jose@ietf.org>, "draft-ietf-jose-json-web-signature@tools.ietf.org" <draft-ietf-jose-json-web-signature@tools.ietf.org>
Subject: Re: [jose] #27: member names MUST be unique needs additional text
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/jose>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jun 2013 07:16:43 -0000

On Jun 27, 2013, at 07:26, "Manger, James H" <James.H.Manger@team.telstra.com> wrote:

> each recipient MUST either reject messages with duplicate names or accept only the last name.

Maybe only gatekeeper functions need validating parsers?

gatekeeper function: A processing step that derives (makes/validates)
an assertion from a JOSE object and then moves forward that JOSE
object unchanged to the next processing step (e.g., to preserve a
signature)

validating parser: A JSON parser that rejects JSON that might be
interpreted differently by another JSON parser

Are we sure that the duplicate key issue is the only one that needs to
be checked by a validating parser?  A number of candidate issues:

http://www.ietf.org/mail-archive/web/json/current/msg01068.html

E.g., what about issue 3.8?  If a gatekeeper function derives an
asssertion about a JOSE object mentioning twitter ID
10765432100123456789, but the next step thinks it is about
10765432100123458000?

https://dev.twitter.com/docs/twitter-ids-json-and-snowflake

The list in msg01068 also is not complete for our purposes, e.g., it
mentions normalization issues only in passing.  A validating parser
sure wants to reject anything that isn't already normalized Unicode.

Maybe gatekeeper functions are not such a bright idea?

Grüße, Carsten