Re: [OAUTH-WG] Nested JWT (was: Re: [jose] "typ":"JWS")

"Richard L. Barnes" <rbarnes@bbn.com> Fri, 06 July 2012 18:40 UTC

Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8B6711E80C2 for <oauth@ietfa.amsl.com>; Fri, 6 Jul 2012 11:40:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.544
X-Spam-Level:
X-Spam-Status: No, score=-106.544 tagged_above=-999 required=5 tests=[AWL=0.055, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zdWJJ+FDEDy6 for <oauth@ietfa.amsl.com>; Fri, 6 Jul 2012 11:40:58 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 18A5B11E80AE for <oauth@ietf.org>; Fri, 6 Jul 2012 11:40:58 -0700 (PDT)
Received: from ros-dhcp192-1-51-6.bbn.com ([192.1.51.6]:61800) by smtp.bbn.com with esmtps (TLSv1:AES128-SHA:128) (Exim 4.77 (FreeBSD)) (envelope-from <rbarnes@bbn.com>) id 1SnDSr-000EJJ-RV; Fri, 06 Jul 2012 14:41:13 -0400
Mime-Version: 1.0 (Apple Message framework v1278)
Content-Type: text/plain; charset="iso-8859-1"
From: "Richard L. Barnes" <rbarnes@bbn.com>
In-Reply-To: <4E1F6AAD24975D4BA5B16804296739436657A2B8@TK5EX14MBXC283.redmond.corp.microsoft.com>
Date: Fri, 06 Jul 2012 14:41:13 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <CF974428-B673-40A6-A486-89060D0F2F5E@bbn.com>
References: <4E1F6AAD24975D4BA5B16804296739436657A131@TK5EX14MBXC283.redmond.corp.microsoft.com> <F6ACB680-7E7D-43BF-A8D8-013B17A97F70@bbn.com> <4E1F6AAD24975D4BA5B16804296739436657A2B8@TK5EX14MBXC283.redmond.corp.microsoft.com>
To: Mike Jones <Michael.Jones@microsoft.com>
X-Mailer: Apple Mail (2.1278)
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Nested JWT (was: Re: [jose] "typ":"JWS")
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jul 2012 18:40:59 -0000

So, first of all, it seems like an abuse of terminology to say "JWT within a JWT", unless you really want to create an infinite recursion.

What's the use case for sign/encrypt/sign, as opposed to just sign/encrypt?




On Jul 6, 2012, at 2:31 PM, Mike Jones wrote:

> A nested JWT is one where a JWT is used as the payload of another JWT, for instance, so you can do sign/encrypt/sign.  See http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-01#section-7 and http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-01#section-5.2.
> 
> I wouldn't use it for multiple signatures - I'd use http://tools.ietf.org/html/draft-jones-json-web-signature-json-serialization-02 or similar for that.
> 
> 				-- Mike
> 
> -----Original Message-----
> From: Richard L. Barnes [mailto:rbarnes@bbn.com] 
> Sent: Friday, July 06, 2012 11:23 AM
> To: Mike Jones
> Cc: Manger, James H; jose@ietf.org
> Subject: Nested JWT (was: Re: [jose] "typ":"JWS")
> 
> Not sure what the appropriate list is for this, so I'm just going to ask it here:
> 
> What is a "nested JWT"?  I'm guessing it's a JWT claim set wrapped in JWS multiple times, as in the example we were discussing earlier?
> 
> Why would you want to do that instead of having parallel signatures?
> 
> 
> 
> 
> On Jul 6, 2012, at 2:19 PM, Mike Jones wrote:
> 
>> Thanks for the thought on this, James.
>> 
>> In the -03 drafts there is now a clear distinction between "typ" (type) - information about this object and the new "cty" (content type) - information about the secured object.  Besides being semantically cleaner, this also simplified nested JWTs.
>> 
>> I then was able to make changes in the spirit of the ones you suggested below, although using slightly different wording in some cases.
>> 
>>                                                                -- 
>> Mike
>> 
>> From: Manger, James H [mailto:James.H.Manger@team.telstra.com]
>> Sent: Tuesday, May 15, 2012 5:40 PM
>> To: Mike Jones; jose@ietf.org
>> Subject: RE: "typ":"JWS"
>> 
>>>> draft-ietf-jose-json-web-signature-02 §7.2 registers the "JWS" type 
>>>> value (for the "typ" header field) . Perhaps "typ":"JWS" is more 
>>>> useful in a JWE header when encrypting signed content (sign-then-encrypt). If this is the intention, then mentioning the "JWS" type value when defining the "typ" header for a JWS is misleading. It would be better to mention it where the JWE spec defines "typ".
>>>> .
>> 
>>> Your second paragraph correctly describes the intended usage.  For instance, see http://tools.ietf.org/html/draft-jones-json-web-token-10#section-5.1 for this usage in action.  The value is registered per the working group decision relating "typ" values to MIME types.
>> 
>> Good. So let's say that. Suggested text changes:
>> 
>> * draft-ietf-jose-json-web-signature-02, section 4.1.8 "typ" (Type) Header Parameter: delete the 2nd sentence because signing a signature is not what we are talking about (and JWS-JS recommends a different approach for multiple signatures anyway).
>> 
>> * section 7.1 Registration of application/jws MIME Media Type: add a phrase explicitly stating the syntax (since the spec mentions two: compact, and JWS JS) so the section says:
>>  This specification registers the "application/jws" MIME Media Type [RFC 2045]
>>  to identify content that uses the JWS compact serialization.
>> 
>> * section 7.2 Registration of "JWS" Type Value: mention the intended use of encrypting signed content by adding this sentence.
>>  The "typ" parameter can be set to "JWS" in a JSON Web Encryption [JWE] header when encrypting signed content.
>> 
>> * draft-ietf-jose-json-web-encryption-02, section 4.1.13 "typ" (Type) Header Parameter, section 11.1 Registration of application/jwe MIME Media Type, section 11.2 Registration of "JWE" type Value: make equivalent changes.
>> 
>> --
>> James Manger
>> 
>> _______________________________________________
>> jose mailing list
>> jose@ietf.org
>> https://www.ietf.org/mailman/listinfo/jose
> 
> 
>