Re: [jose] Canonical JSON form

Bret Jordan <jordan.ietf@gmail.com> Sun, 18 November 2018 21:53 UTC

Return-Path: <jordan.ietf@gmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01871130DE4 for <jose@ietfa.amsl.com>; Sun, 18 Nov 2018 13:53:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.998
X-Spam-Level:
X-Spam-Status: No, score=-0.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XtJdckiWapXL for <jose@ietfa.amsl.com>; Sun, 18 Nov 2018 13:53:07 -0800 (PST)
Received: from mail-yb1-xb34.google.com (mail-yb1-xb34.google.com [IPv6:2607:f8b0:4864:20::b34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 276F2127598 for <jose@ietf.org>; Sun, 18 Nov 2018 13:53:07 -0800 (PST)
Received: by mail-yb1-xb34.google.com with SMTP id h187-v6so11841970ybg.10 for <jose@ietf.org>; Sun, 18 Nov 2018 13:53:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=FuF8mqxn5aAxVMjRhElyrIjqKVQMy7nlEL9vm/dHxSc=; b=lHcBz8BFXWwBt2yLX3CnUBAvtRWLDr2UB+hkPsLlpDeViIGycqgsNOZkMtcuq7vJAg BS/xoIvc3S79p9kJc+jLV8gMqmUkDI+uhv+33IRf1bwBlR6GNicxwmnZSFWBnaXL1IIm prbRRMFvcWi9qHmwlrilIxyvwgwwcZceVLzmspn7QAd/uca88o41Vv8LHzVe21h/aCGX z7fTspFMEK5dJxjv10udnHSZzCiHRSE3OZXtZBlv4GRo209DUSvAf+qGKA7/2G4LGaAE Lv4E5x3pr5islqrzDGGJhFb0AMn7RTQ47NNbmeiwTwaVAkkMkOTMZRm5nqGqQMMAGKGJ 2k6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=FuF8mqxn5aAxVMjRhElyrIjqKVQMy7nlEL9vm/dHxSc=; b=hQumXPfy6f/1cURJymUEWofD6IzRQKJt0xMfNeGAli9UUB91H38H4uSvrADMCx9gQF TSzOgXWLAgGm6vAORCeRna0SFKksZwxwKAEguksApDhj4Pb7tdwc0Bd1rOvM1D4pU6eI 6lkpAeXkggE82mw9wvuFS1D89MFWBIvtRChZ0+EPQLWoiLkdEn+M4bdn98H1d86CPJCN vQO2TayzWsFkGSUurhvpBRwYxmOwYFyF2KaJAbiuOBHwFg7PO0fmQAZ0W7D51u1qO0CG aLbfUhhQZzdeDHsT9sDzJkowh2OLHYm8Yg99td8jjyuSWZ52QlTpEHSGFm0KKZp+Jciv BWlA==
X-Gm-Message-State: AA+aEWZB/mHCELQku2UQu3dXj66ueMNnoPbkAQKJbx9xezV1eugmuXbO Nk1UzJTMhh7JKLouEOHJ5VM=
X-Google-Smtp-Source: AFSGD/X54sy1yhZG7av8RiBynbXOOQ5I9mbGVPWgv8JjvmWqZXFJRACWexq8lLBisRr6bs1ku1x/pA==
X-Received: by 2002:a25:6b50:: with SMTP id o16-v6mr2715563ybm.15.1542577986295; Sun, 18 Nov 2018 13:53:06 -0800 (PST)
Received: from ?IPv6:2605:a601:3260:266:141:2994:c6dd:f78b? ([2605:a601:3260:266:141:2994:c6dd:f78b]) by smtp.gmail.com with ESMTPSA id n142-v6sm570874ywd.75.2018.11.18.13.53.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 18 Nov 2018 13:53:05 -0800 (PST)
From: Bret Jordan <jordan.ietf@gmail.com>
Message-Id: <E7458037-AC7A-4C84-870F-9BDAEA420357@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_F6CAE3DA-D82D-4879-A02E-BA95193064C0"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Sun, 18 Nov 2018 14:52:59 -0700
In-Reply-To: <CADEL5zvbLOtuFBD6zgEpcUQZ2Y7hNYHxLcj=EhkEOnV-_dqwJQ@mail.gmail.com>
Cc: David Waite <david@alkaline-solutions.com>, Jim Schaad <ietf@augustcellars.com>, Carsten Bormann <cabo@tzi.org>, jose@ietf.org
To: Anders Rundgren <anders.rundgren.net@gmail.com>
References: <12DD2F97-80C3-4606-9C6B-03F7A4BF19DE@gmail.com> <CAOASepNX4aYVmPWXyODn0E2Om_rimACPECqJBvZSOXVVd_p8LA@mail.gmail.com> <D21F3A95-0085-4DB7-A882-3496CC091B34@gmail.com> <CAOASepM=hB_k7Syqw4+b7L2vd6E_J0DSAAW0mHYdLExBZ6VBuw@mail.gmail.com> <00ad01d460f4$69ae8a00$3d0b9e00$@augustcellars.com> <8436AEE7-B25A-4538-B8F6-16D558D9A504@gmail.com> <MEAPR01MB35428606C09BF315DE04CC79E5E10@MEAPR01MB3542.ausprd01.prod.outlook.com> <CAHbuEH6DCD7Zc+PK3TnCBkKv1esnROwyCcDb8ZR+TKwgQQ+yXQ@mail.gmail.com> <0E6BD488-74D5-4640-BC31-5E45B0531AFC@gmail.com> <CAHbuEH5oH-Km6uAjrSr0pEHswFBLuDpfVweQ+gpj472yk+8iTQ@mail.gmail.com> <073CB50F-8D91-4EF6-90BE-FC897D557AA6@oracle.com> <A37D69B1-6B77-4E11-8BB9-A0209C77752C@tzi.org> <434fbdb6-0202-5a02-4cec-9332fbbe548c@gmail.com> <FBBFA6FA-4B0C-4239-9145-0B713120EC98@tzi.org> <01fd01d47f5f$4c4889f0$e4d99dd0$@augustcellars.com> <7b1d293c-1d97-44e4-0cd8-55ec1db6c3b5@gmail.com> <AD2DB2EB-3F06-4C55-94E4-CED60F6FF4CF@alkaline-solutions.com> <CADEL5zvbLOtuFBD6zgEpcUQZ2Y7hNYHxLcj=EhkEOnV-_dqwJQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/xQCbkgWJ5jEyF6Vn_bXrKoLPvAs>
Subject: Re: [jose] Canonical JSON form
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Nov 2018 21:53:09 -0000

Andres,

I fully support working on this.  Can we have a meeting / BOF in Prague to talk through this and get everyone on the same page..?

I think some simple and clear examples might help everyone.

1) What is being proposed

2) Why it is needed

3) Why JOSE/COSE is not working for us

4) Possible solutions to this problem 



Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

> On Nov 18, 2018, at 2:03 PM, Anders Rundgren <anders.rundgren.net@gmail.com> wrote:
> 
> 
> 
> On Sun, 18 Nov 2018, 20:37 David Waite <david@alkaline-solutions.com <mailto:david@alkaline-solutions.com> wrote:
> Not to be a jerk (I promise!), but is there documentation of the TEEP issues with using JWS/JWE structure?
> 
> The existing specs seem to use JOSE as-is, I didn’t immediately see anything on the ML or in GitHub issues. 
> 
> Correct.  Since the requirement was using standardized security solutions but also maintaining a reasonable message structure, they didn't have any option but adding a redundant layer like the TAInformation / TAInformationTBS pair.
> 
> I was in a similar position having a bunch of systems to be converted from XML to JSON.  Unlike TEEP, I had the freedom to select any working solution which is the background to this work..
> 
> 
> 
> It is difficult to fairly argue a specific desired solution to a non-disclosed problem set. Especially when so many people have battle scars from implementing that solution in the past.
> 
> Implementing, documenting and verifying this concept took quite some time but apart from a math bug in .NET there were no surprises whatsoever.
> 
> The problem set is described, here is a short version:
> - Keeping signed JSON in JSON format
> - Enabling a consistent message structure regardless if messages are signed or not
> - Supporting signed JavaScript objects
> 
> Anders
> https://mobilepki.org/jws-jcs <https://mobilepki.org/jws-jcs>
> 
> 
> 
> -DW
> 
> > On Nov 18, 2018, at 11:06 AM, Anders Rundgren <anders.rundgren.net@gmail.com <mailto:anders.rundgren.net@gmail.com>> wrote:
> > 
> > There's no mystery going on here.  The TEEP folks needed Signed Data rather than Signature objects with embedded Data.
> 
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose