So the obvious question (to me) is whether or not the claim should move to the JOSE layer.

 -- Justin

On 08/28/2012 04:46 PM, Brian Campbell wrote:
Isn't the pool question really about JOSE (this is the JOSE list after all) and if a nonce or timestamp type thing should be defined in JWE/JWS as a Reserved Header Parameter Name?

I don't think it can be said that we already have an issued time defined. "iat" (Issued At) is a claim defined in JWT. That's all together a different thing than a JOSE header and I don't see anything like it anywhere in the JOSE docs. JWT is a layer above JOSE and, while there is a lot of overlap of people, is being developed in a completely different WG.

I'm, at this point, saying we need this thing but rather just trying to clarify the question.

On Tue, Aug 28, 2012 at 1:06 PM, Breno de Medeiros <[email protected] <mailto:[email protected]>> wrote:

    I agree that this should be looked independently of oauth2.

    Nonce is a generally used concept in crypto, though sometimes
    protocol designers have called for nonces with bad outcomes
    because the difficulty of implementing nonce-checking was
    disregarded. However, difficulties to implement nonces in general
    are not relevant if there is a compelling use case that is able to
    leverage nonces effectively.

    As for timestamps: we already have issued time and the nonce can
    embed a timestamp additionally. So I don't think we need to
    concern ourselves with timestamps when considering nonces.




    On Tue, Aug 28, 2012 at 8:09 AM, John Bradley <[email protected]
    <mailto:[email protected]>> wrote:

        In OAuth 2 state gets overloaded with a bunch of things from
        preventing XSRF to providing a handle to look up who the the
        authorization request was sent to.

        In Connect we added a nonce sent by client that is returned
        inside the signed id_token (JWT) to allow the client to detect
        replay, and optionally reference a specific browser session
        that presents the id_token.

        The nonce I suggested for JOSE is not ether of those.

        I used nonce in the sense that it is used with stream cyphers
        when the same key is used over multiple messages.

        JOSE will be used for more than OAuth and JWT.   There are
        cases where adding entropy to the header will be a security
        benefit.  I would like to have a standard claim for doing that.
        If people want to call it something else that is fine, but it
        is a nonce by definition.
        If used it should be a random or pseudo random value that is
        time variant with sufficient granularity to ensure a nonce is
        used only once.

        John B.

        On 2012-08-28, at 10:32 AM, Justin Richer <[email protected]
        <mailto:[email protected]>> wrote:

        On 08/25/2012 03:37 AM, Axel Nennker wrote:
        To clarify: What is the base specification that Jim mentioned?
        Is it:
        http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-03 ?

        Would somebody please present a use-case for either nonce or
        timestamp?
        If a jwt is used with oauth2 then what is the difference
        between nonce and state? Nonce would be signed while state
        is not?


        Nonce would generally be generated by the entity creating the
        token. State in OAuth is generated by the client, and would
        only be protected if the client had a means to make a signed
        request to the server, using either a MAC binding or a
        JWT-based OIDC-style RequestObject.

         -- Justin

        I guess I am missing some information that those in the room
        who voted "yes" had?

        Axel

        2012/8/25 Mike Jones <[email protected]
        <mailto:[email protected]>>

            I'll note for discussion purposes that a nonce and a
            timestamp are not the same thing (although sometimes
            they are used to achieve similar/related goals).  A
            nonce tends to be an opaque value that must be preserved
            across the communication.  Whereas a timestamp typically
            has defined semantics - sometimes simply a
            non-decreasing integer value - and sometimes a
            representation of time, and then, sometimes with a
            uniqueness requirement.

            For discussion purposes, I'll say that the simplest
            thing for us to do (should we decide to do anything in
            this regard) would be to define the nonce as an opaque
            string value that must be preserved.

            We could also define a timestamp parameter, but as I
            wrote above, that would likely require us to specify
            additional semantics - starting with whether it's a
            non-decreasing integer or a representation of a time
            value.  This seems much harder to define and possibly to
            use than a nonce.

            Would it make sense to define a nonce parameter now and
            hold off on defining a timestamp parameter until there's
            a clear demonstrated use case for which a nonce is not
            sufficient?  That would be my personal recommendation.

            Best wishes,
            -- Mike

            -----Original Message-----
            From: [email protected]
            <mailto:[email protected]>
            [mailto:[email protected]
            <mailto:[email protected]>] On Behalf Of Jim Schaad
            Sent: Friday, August 17, 2012 12:05 AM
            To: [email protected] <mailto:[email protected]>
            Subject: [jose] POLL: Nonce/Timestamp parameter

            <CHAIR>

            If you voted at the face-2-face please do not vote
            again.  If you want to provide comments please change
            the title from POLL to DISCUSS.

            Do we need to define a nonce/timestamp parameter in the
            base specification?



            Room vote:  6 yes, 0 no, 1 discuss


            _______________________________________________
            jose mailing list
            [email protected] <mailto:[email protected]>
            https://www.ietf.org/mailman/listinfo/jose


            _______________________________________________
            jose mailing list
            [email protected] <mailto:[email protected]>
            https://www.ietf.org/mailman/listinfo/jose




        _______________________________________________
        jose mailing list
        [email protected]  <mailto:[email protected]>
        https://www.ietf.org/mailman/listinfo/jose

        _______________________________________________
        jose mailing list
        [email protected] <mailto:[email protected]>
        https://www.ietf.org/mailman/listinfo/jose


        _______________________________________________
        jose mailing list
        [email protected] <mailto:[email protected]>
        https://www.ietf.org/mailman/listinfo/jose




-- --Breno


    _______________________________________________
    jose mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/listinfo/jose



_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to