Re: [jose] JWS Counter Signatures

Nat Sakimura <sakimura@gmail.com> Fri, 23 November 2018 19:32 UTC

Return-Path: <sakimura@gmail.com>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E96C712D84D for <jose@ietfa.amsl.com>; Fri, 23 Nov 2018 11:32:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X_z3w9EYeMNk for <jose@ietfa.amsl.com>; Fri, 23 Nov 2018 11:32:32 -0800 (PST)
Received: from mail-wr1-x42d.google.com (mail-wr1-x42d.google.com [IPv6:2a00:1450:4864:20::42d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D97A312D4EB for <jose@ietf.org>; Fri, 23 Nov 2018 11:32:31 -0800 (PST)
Received: by mail-wr1-x42d.google.com with SMTP id v13so9844544wrw.5 for <jose@ietf.org>; Fri, 23 Nov 2018 11:32:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=LtAuLNWf9D0X9qWo2XtSe28bRpl9F/LnMhgvsRT+8d0=; b=qHTVU8MpukWRwicUKI91r0RDViV8+V/9IDLqV5Vt096+Hx2MIEDNVbTSdUkQCasFzD Oj9002cVJrdQ8aAyA7QPy3hqEjKq3CJBDJemIioHUbk8CbmrDLH+/B+zjINn1OimkwQM 5c5bV6ZwhBZmoYuyQyFpO1KT5vjiPmQUloyF00+hI9qSGtFEyXDvXQysw+01POguMXhO ePgB1TXgGvS4IWfkR0xbu9tDtJv+RFco1aTCCuDd3yArVEs6V7M7ZJRkxnarHYDgVVWF VClwbn/CBu3t/6Tlzi3XWOZ2gA8oWEQxYtNNodsVruQsznTM0AS8kxQjuMe4D7QXtPua C5CA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=LtAuLNWf9D0X9qWo2XtSe28bRpl9F/LnMhgvsRT+8d0=; b=EZodLPrIWqE5YFXY/F4D9E2GtR2CvX+MgmZI7FyTDNY4sk+DK/Ea2TfaK9GBtRcywJ o6c5FfJZ5l1CE4VipFA8hF5O4AFyeBQJd4L17ZwfZT91J7G25YuUuSa7dSlF0CaSgPbg BMTI0t6gCvUwvM8G4ViHyL9QxNlGiEqF7PSE0g13Mn2fJn9cpp8bRhrHAu0tMimxeitZ Ey0528DWgu0c4OtOp1F8QkDtAGudVik7V0jldphM9AnRUgM96BqQ75B0N9tlxbRb/YXm AW41kHsAG1malcvMBWWdudzmp5RJE1u3ePPbORvSIxPjcrICnK4fkBP/wC6EUcjNutm/ fkOA==
X-Gm-Message-State: AA+aEWZxrtzi9jV2z4gQ2bZ4BeeGJgxuRhovSDMI4azkLQPofRZi3aOF s7hLeSartuiTJ2SRBV4QfqlhaObNnAjnguMPQ4c=
X-Google-Smtp-Source: AFSGD/WMp3N7rnEwMLYC9R8v67NN4vJOarGxoMVQ5y8uAqSlnynlir0tYYJxljYNwpZ6f8UHPhebiZIBI6EZ7j6ORMI=
X-Received: by 2002:adf:e34b:: with SMTP id n11mr2333113wrj.91.1543001549913; Fri, 23 Nov 2018 11:32:29 -0800 (PST)
MIME-Version: 1.0
References: <12DD2F97-80C3-4606-9C6B-03F7A4BF19DE@gmail.com> <CAOASepNX4aYVmPWXyODn0E2Om_rimACPECqJBvZSOXVVd_p8LA@mail.gmail.com> <D21F3A95-0085-4DB7-A882-3496CC091B34@gmail.com> <CAOASepM=hB_k7Syqw4+b7L2vd6E_J0DSAAW0mHYdLExBZ6VBuw@mail.gmail.com> <00ad01d460f4$69ae8a00$3d0b9e00$@augustcellars.com> <8436AEE7-B25A-4538-B8F6-16D558D9A504@gmail.com> <MEAPR01MB35428606C09BF315DE04CC79E5E10@MEAPR01MB3542.ausprd01.prod.outlook.com> <CAHbuEH6DCD7Zc+PK3TnCBkKv1esnROwyCcDb8ZR+TKwgQQ+yXQ@mail.gmail.com> <0E6BD488-74D5-4640-BC31-5E45B0531AFC@gmail.com> <CAHbuEH5oH-Km6uAjrSr0pEHswFBLuDpfVweQ+gpj472yk+8iTQ@mail.gmail.com> <073CB50F-8D91-4EF6-90BE-FC897D557AA6@oracle.com> <A37D69B1-6B77-4E11-8BB9-A0209C77752C@tzi.org> <434fbdb6-0202-5a02-4cec-9332fbbe548c@gmail.com> <FBBFA6FA-4B0C-4239-9145-0B713120EC98@tzi.org> <01fd01d47f5f$4c4889f0$e4d99dd0$@augustcellars.com> <7b1d293c-1d97-44e4-0cd8-55ec1db6c3b5@gmail.com> <AD2DB2EB-3F06-4C55-94E4-CED60F6FF4CF@alkaline-solutions.com> <017701d48353$395f0600$ac1d1200$@augustcellars.com> <8A085454-EC20-469E-866B-BB867367D396@gmail.com>
In-Reply-To: <8A085454-EC20-469E-866B-BB867367D396@gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
Date: Sat, 24 Nov 2018 04:32:18 +0900
Message-ID: <CABzCy2DTGyTeZ9ZFM5CrFizVOdJRYM5OhkKOzTngjWc9EXJdjg@mail.gmail.com>
To: jordan.ietf@gmail.com
Cc: Jim Schaad <ietf@augustcellars.com>, jose@ietf.org, Anders Rundgren <anders.rundgren.net@gmail.com>
Content-Type: multipart/alternative; boundary="00000000000045454d057b5a0bd8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/yWKaqFBFp79zdMLDDPtLU33Qjg8>
Subject: Re: [jose] JWS Counter Signatures
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Nov 2018 19:32:35 -0000

Hmmm. I am failing to understand the problem. In JWS:

1) you can have multiple signatures on the same hash: Parallel signature;
as well as
2) you could encapsulate the signed blob into a new signature: Serial
signature.

What is the problem?

Nat

On Sat, Nov 24, 2018 at 4:16 AM Bret Jordan <jordan.ietf@gmail.com> wrote:

> I have need have having both parallel and nested signatures of JSON
> content.
>
>
> Thanks,
> Bret
> PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
> "Without cryptography vihv vivc ce xhrnrw, however, the only thing that
> can not be unscrambled is an egg."
>
> On Nov 23, 2018, at 10:37 AM, Jim Schaad <ietf@augustcellars.com> wrote:
>
> I am having a potential terminology problem.  When I read the term Counter
> Signature, I am used to this meaning that I am signing a signature,
> potentially with some additional information.   I am not sure that this is
> what you have going on below.  Are these signatures "nested" or "parallel"
> or "on the previous signature"?
>
> Jim
>
>
> -----Original Message-----
> From: jose <jose-bounces@ietf.org> On Behalf Of Anders Rundgren
> Sent: Thursday, November 22, 2018 11:50 PM
> To: jose@ietf.org
> Subject: [jose] JWS Counter Signatures
>
> Counter signatures were actually the major "inspiration" for Canonical
>
> JSON
>
> since JWS based dittos are hard to debug and document due to the deep
> nesting of Base64Url encoded objects but it is still fully doable.
>
> However, in a system which I will present at Trustech 2018, I came up with
>
> a
>
> counter signature scheme where JOSE simply put ran out of gas.
>
> https://cyberphone.github.io/doc/payments/payment-decentralization-scheme-
> 1a.pdf
>
> In this system (very briefly):
> 1. a Merchant creates a Payment Request and sends it to the Payer for
> authorization 2. the Payer authorizes the Payment Request with his/her
> signature key.  The signed authorization data includes a hash of the
>
> Payment
>
> Request 3. the Payer (for privacy reasons) encrypts the authorization data
>
> and
>
> returns it to the Merchant together with an unencrypted URL pointing to
>
> the
>
> Payer's bank 4. the Merchant sends the original Payment Request + the
> encrypted Payer authorization data to the Payer's banks for fulfillment 5.
>
> the
>
> Payer's bank decrypts and validates the authorization data, including
>
> verifying
>
> that the hash of the Merchant-supplied Payment Request matches the hash in
> the authorization data
>
> It seems to me that a JOSE based design would have to be architected in a
> fundamentally different way.
>
> Anders
>
>
>
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose
>
>
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose
>
>
> _______________________________________________
> jose mailing list
> jose@ietf.org
> https://www.ietf.org/mailman/listinfo/jose
>


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en