Yes that is consistent with the conclusion I attempted to summarize to the list.

John B.


On 2012-11-15, at 5:46 PM, Mike Jones <[email protected]> wrote:

> That's close to my recollection as well.  I'll summarize the primary 
> conclusions in a different way to hopefully make them even clearer to people 
> who weren't there:
> 
> (1)  We will define JWK extensions to represent private and symmetric keys
> (2)  We will recommend protection of private and symmetric keys by encrypting 
> their JWK representations in a JWE
> (3)  We will define an additional JWA "alg" value for generation of a 
> symmetric key from a password (thus enabling password-based key protection 
> schemes)
> 
> The two deliverables we agreed to were:
> (A)  The JWK extension document defining (1), which Mike will produce
> (B)  A key protection application document specifying (2) and (3), which Matt 
> will produce
> 
> Note that (B) will use the JWA registry to register (3), rather than adding 
> (3) to the JWA doc itself.
> 
>                               -- Mike
> 
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf Of Matt 
> Miller (mamille2)
> Sent: Thursday, November 15, 2012 10:25 AM
> To: [email protected]
> Subject: [jose] Whiteboard Discussion MInutes
> 
> [ I urge the original participants to correct any omissions or glaring 
> mistakes ]
> 
> Participants
> ============
> * Richard Barnes
> * John Bradley
> * Joe Hildebrand
> * Michael Jones
> * Matt Miller
> * Jim Schaad
> 
> "What's a JOSE"
> ===============
> 
> We started with a discussion of what the areas of concerns for JOSE are 
> (established or otherwise):
> 
> * public key
> * private key
> * symmetric key
> * sign
> * encrypt
> * MAC
> * wrapped keys
> * passphrase-based wrapping
> * algorithms
> * extensibility
> * common attributes
> * serialization/syntax
> 
> Regarding Keys
> ==============
> 
> There was also discussion on whether wrapped keys were their own top-level 
> object, or an application of JWE.  With this discussion, there was rough 
> consensus that keys (including symmetric keys) should have the ability to 
> include additional information (e.g. "expires" ).
> 
> For top-level, this is approximately as presented in the WG:
> {
>  "typ":"transport",
>  "alg":RSA-OEAP",
>  "jwk":{ ... },
>  "val":base64url(pk-encrypt(jku, symmetric key value)) }
> 
> For JWE application, the key would have a JWK representation:
> {
>  "typ":"AES",
>  "key":base64url(symmetric key value)
> }
> 
> Which is then serialized to UTF-8 and used as the plaintext into JWE.
> 
> Given this, there was very rough consensus that we pursue the "wrapped keys 
> as JWE application" path, although it was suggested Richard provide a more 
> concrete example of the top-level model.
> 
> Regarding Encrypted Private Keys
> ================================
> 
> There was discussion and consensus on adding support for PBKDF2 to derive a 
> symmetric key from a password.  The details are to be worked out as part of 
> the wrapped key document.
> 
> Regarding Organization
> ======================
> 
> There was discussion on the organization of items, and whether the current 
> documentation is sufficient.  While there was no consensus on what the best 
> layout is, there was also no consensus on changing anything.
> 
> Work Items
> ==========
> 
> There was rough consensus on the following outputs, assuming no objections 
> from the rest of the WG:
> 
> * A document extending "RSA" and "EC" with the private key factors, plus a 
> new JWK for symmetric keys.  Tentatively to be done by Mike Jones, starting 
> with draft-jones-jose-json-private-key
> * A document that applies JWE to protecting keys (as JWK objects), and 
> defines an algorithm that uses PBKDF2 for passphrase-based protection.  
> Tentatively to be done by Matt Miller.
> 
> 
> - m&m
> 
> Matt Miller < [email protected] >
> Cisco Systems, Inc.
> 
> PS: If you are interested in the cryptic notes, the images are temporarily 
> available at < http://outer-planes.net/ietf/ietf85-josewg/ >.
> _______________________________________________
> jose mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/jose

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to