Replies inline in green...


-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of Richard 
Barnes
Sent: Tuesday, January 15, 2013 1:16 PM
To: [email protected]
Cc: [email protected]
Subject: Re: [jose] draft revision to JOSE charter



On 1,2,3,5,6:



Do I understand correctly that milestones 5 and 6 are intended to be something 
like the JSON serialization documents, whereas 1, 2, and 3 are supposed to be 
something like the current documents?  If that's the case, then we might as 
well call a spade a spade and remove "JSON-structured" from 1, 2, and 3.



I find that sort of back-tracking pretty distasteful, though.  As I've said 
before, it would be better if we could come up with a reasonable JSON syntax 
that would profile down to something compact and URL-safe.



Yes, (1), (2), (3) (and (4)) are the deliverables in the present charter 
(http://datatracker.ietf.org/wg/jose/charter/).  The "JSON-structured" wording 
is from the current charter.  I suppose it could be changed to "JSON-based" if 
people prefer that.  But minimizing changes to the existing charter items also 
seems like a good goal.  I'd be fine with either the "JSON-structured" wording 
from the current charter or "JSON-based".



And yes, (5) and (6) are the JSON serialization documents, which we decided 
adopt as working group documents and create charter items for at the working 
group meeting in Atlanta.  Consensus to do this is recorded at 
http://www.ietf.org/proceedings/85/minutes/minutes-85-jose.    See 
http://tools.ietf.org/html/draft-jones-jose-jws-json-serialization-04 and 
http://tools.ietf.org/html/draft-jones-jose-jwe-json-serialization-04 for the 
current versions of these documents.



On 4:



This group has agreed time and again that we will not have mandatory to 
implement algorithms.  As Mr. Housley put it, according to the IETF 85 minutes, 
"Each app defines MTI, achieving separation of MTI from syntax.".  So the 
phrase "including mandatory-to-implement algorithms" needs to be struck from 
item (4).



This statement makes no sense, as our current charter already *requires* us to 
produce "A Standards Track document specifying mandatory-to-implement 
algorithms for the other three documents".  The rechartering is about adding 
the new deliverables 5-8 - not changing our existing deliverables, of which 
this is one already one.



On 7,8:



I have no idea what milestones 7 and 8 are supposed to entail.  JWE already has 
wrapped keys, and JWS should (for MAC).  As above, we should strive to get this 
right the first time instead of doing something halfway with a promise to patch 
it later.



I'm surprised that you say that don't understand 7 and 8, as you were in the 
Friday morning meeting in Atlanta that was organized by Joe Hildebrand and Jim 
Schaad that defined them.  The minutes of that meeting are at 
http://www.ietf.org/mail-archive/web/jose/current/msg01337.html.  Deliverable 
(A) in the minutes is charter item (7).  Deliverable (B) in the minutes is 
charter item (8).



(7) extends (3) to define JSON representations for private and symmetric keys 
(whereas (3) only defines representations for public keys).  See 
http://tools.ietf.org/html/draft-jones-jose-json-private-and-symmetric-key-00 
for a draft that does this.



As we discussed at that meeting, while JWE uses wrapped key *values* (wrapped 
CMKs), this new document that Matt is writing will enable us to wrap both key 
values and associated key properties.  It wraps a JWK representation (which per 
(7), may represent private and symmetric keys), including potential key 
properties as the key's "alg" and "kid" values, as well as others that may be 
used.  It's intentionally more general than the wrapped CMK value used in JWE, 
again, as discussed during the Friday meeting in Atlanta.



--Richard



                                                                Best wishes,

                                                                -- Mike



On Jan 11, 2013, at 3:02 PM, Karen O'Donoghue 
<[email protected]<mailto:[email protected]>> wrote:



> Folks,

>

> Below is a draft update to our charter based on discussions at the last IETF 
> meeting. The key changes are adding key representations and algorithm 
> identifiers to the scope of work. This includes some minor language updates 
> in the general section, the addition of deliverables 5-8, and the addition 
> and modification of a number of milestones related to these documents.

>

> In addition, the phrase "using a compact URL-safe representation" has been 
> added to the descriptions of the first two deliverables and "compact JSON 
> object" used in the milestones.

>

> Jim and I will be submitting a revised charter shortly, and we would like 
> your comments by 18 January if possible.

>

> Thanks,

> Karen

>

>

> Description of Working Group

>

> JavaScript Object Notation (JSON) is a text format for the serialization of 
> structured data described in RFC 4627.  The JSON format is often used for 
> serializing and transmitting structured data over a network connection.  With 
> the increased usage of JSON in protocols in the IETF and elsewhere, there is 
> now a desire to offer security services such as encryption, digital 
> signatures, message authentication codes (MACs), and key representations for 
> data that is being carried in JSON format.

>

> Different proposals for providing such security services have already been 
> defined and implemented.  This Working Group's task is to standardize four 
> kinds of security services, integrity protection (signature and MAC), 
> encryption, key representations, and algorithm identifiers, in order to 
> increase interoperability of security features between protocols that use 
> JSON.  The Working Group will base its work on well-known message security 
> primitives (e.g., CMS), and will solicit input from the rest of the IETF 
> Security Area to be sure that the security functionality in the JSON format 
> is correct.

>

> This group is chartered to work on eight documents:

>

> (1) A Standards Track document specifying how to apply JSON-structured 
> integrity protection to data, including (but not limited to) JSON data 
> structures, using a compact URL-safe representation.  "Integrity protection" 
> includes public-key digital signatures as well as symmetric-key MACs.

>

> (2) A Standards Track document specifying how to apply a JSON-structured 
> encryption to data, including (but not limited to) JSON data structures, 
> using a compact URL-safe representation.

>

> (3) A Standards Track document specifying how to encode public keys as 
> JSON-structured objects.

>

> (4) A Standards Track document specifying algorithms and algorithm 
> identifiers, including mandatory-to-implement algorithms for the previous 
> three documents.

>

> (5) A Standards Track document specifying how to apply JSON-structured 
> integrity protection to data, including (but not limited to) JSON data 
> structures, using a JSON representation supporting multiple recipients.  This 
> document will build upon the concepts and structures in (1).

>

> (6) A Standards Track document specifying how to apply a JSON-structured 
> encryption to data, including (but not limited to) JSON data structures, 
> using a JSON representation supporting multiple recipients.  This document 
> will build upon the concepts and structures in (2).

>

> (7) A Standards Track document specifying how to encode private and symmetric 
> keys as JSON-structured objects.  This document will build upon the concepts 
> and structures in (3).

>

> (8) A Standards Track application document specifying a means of protecting 
> private and symmetric keys via encryption.  This document will build upon the 
> concepts and structures in (2) and (7).  This document may register 
> additional algorithms in registries defined by (4).

>

> The working group may decide to address combinations of these goals in 
> consolidated document(s), in which case the concrete milestones for these 
> goals will be satisfied by the consolidated document(s).

>

> Goals and Milestones

>

> Jan 2012              Submit compact JSON object integrity document (1) as a 
> WG item.

>

> Jan 2012              Submit compact JSON object encryption document (2) as a 
> WG item.

>

> Jan 2012              Submit JSON key format document (3) as a WG item.

>

> Jan 2012              Submit JSON algorithm document (4) as a WG item.

>

> Feb 2013              Start Working Group Last Call on compact JSON object 
> integrity document (1).

>

> Feb 2013              Start Working Group Last Call on compact JSON object 
> encryption document (2).

>

> Feb 2013              Start Working Group Last Call on JSON key format 
> document (3).

>

> Feb 2013              Start Working Group Last Call on JSON algorithm 
> document (4).

>

> Mar 2013             Submit JSON object integrity document (1) to IESG for 
> consideration as Standards Track document.

>

> Mar 2013             Submit JSON object encryption document (2) to IESG for 
> consideration as Standards Track document.

>

> Mar 2013             Submit JSON key format document (3) to IESG for 
> consideration as Standards Track document.

>

> Mar 2013             Submit JSON algorithm document (4) to IESG for 
> consideration as Standards Track document.

>

> Mar 2013             Submit multi-recipient JSON object integrity document 
> (5) as a WG item.

>

> Mar 2013             Submit multi-recipient JSON object encryption document 
> (6) as a WG item.

>

> Mar 2013             Submit JSON private and symmetric key document (7) as a 
> WG item.

>

> Mar 2013             Submit JSON key protection application document (8) as a 
> WG item.

>

> Jun 2013              Start Working Group Last Call on multi-recipient JSON 
> object integrity document (5).

>

> Jun 2013              Start Working Group Last Call on multi-recipient JSON 
> object encryption document (6).

>

> Jun 2013              Start Working Group Last Call on JSON private and 
> symmetric key document (7).

>

> Jun 2013              Start Working Group Last Call on JSON key protection 
> application document (8).

>

> Jul 2013               Submit multi-recipient JSON object integrity document 
> (5) to IESG for consideration as Standards Track document.

>

> Jul 2013               Submit multi-recipient JSON object encryption document 
> (6) to IESG for consideration as Standards Track document.

>

> Jul 2013               Submit JSON private and symmetric key document (7) to 
> IESG for consideration as Standards Track document.

>

> Jul 2013               Submit JSON key protection application document (8) to 
> IESG for consideration as Standards Track document.

>

> _______________________________________________

> jose mailing list

> [email protected]<mailto:[email protected]>

> https://www.ietf.org/mailman/listinfo/jose



_______________________________________________

jose mailing list

[email protected]<mailto:[email protected]>

https://www.ietf.org/mailman/listinfo/jose
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to