[ I urge the original participants to correct any omissions or glaring mistakes 
]

Participants
============
* Richard Barnes
* John Bradley
* Joe Hildebrand
* Michael Jones
* Matt Miller
* Jim Schaad

"What's a JOSE"
===============

We started with a discussion of what the areas of concerns for JOSE are 
(established or otherwise):

* public key
* private key
* symmetric key
* sign
* encrypt
* MAC
* wrapped keys
* passphrase-based wrapping
* algorithms
* extensibility
* common attributes
* serialization/syntax

Regarding Keys
==============

There was also discussion on whether wrapped keys were their own top-level 
object, or an application of JWE.  With this discussion, there was rough 
consensus that keys (including symmetric keys) should have the ability to 
include additional information (e.g. "expires" ).

For top-level, this is approximately as presented in the WG:
{
  "typ":"transport",
  "alg":RSA-OEAP",
  "jwk":{ ... },
  "val":base64url(pk-encrypt(jku, symmetric key value))
}

For JWE application, the key would have a JWK representation:
{
  "typ":"AES",
  "key":base64url(symmetric key value)
}

Which is then serialized to UTF-8 and used as the plaintext into JWE.

Given this, there was very rough consensus that we pursue the "wrapped keys as 
JWE application" path, although it was suggested Richard provide a more 
concrete example of the top-level model.

Regarding Encrypted Private Keys
================================

There was discussion and consensus on adding support for PBKDF2 to derive a 
symmetric key from a password.  The details are to be worked out as part of the 
wrapped key document.

Regarding Organization
======================

There was discussion on the organization of items, and whether the current 
documentation is sufficient.  While there was no consensus on what the best 
layout is, there was also no consensus on changing anything.

Work Items
==========

There was rough consensus on the following outputs, assuming no objections from 
the rest of the WG:

* A document extending "RSA" and "EC" with the private key factors, plus a new 
JWK for symmetric keys.  Tentatively to be done by Mike Jones, starting with 
draft-jones-jose-json-private-key
* A document that applies JWE to protecting keys (as JWK objects), and defines 
an algorithm that uses PBKDF2 for passphrase-based protection.  Tentatively to 
be done by Matt Miller.


- m&m

Matt Miller < [email protected] >
Cisco Systems, Inc.

PS: If you are interested in the cryptic notes, the images are temporarily 
available at < http://outer-planes.net/ietf/ietf85-josewg/ >.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to