I have no such need for an x5c outside of a JWK. Hence my suggestion for a JWK 
specifically for wrapping PKIX.  In fact, I personally have a strong preference 
for removing anything key-related from the base headers that isn't "jwk" or 
"kid" (or now possibly "spi").

I'd much rather see this in the JWK spec; I only suggested a new draft to help 
frame such a discussion.


- m&m

Matt Miller < [email protected] >
Cisco Systems, Inc.

On Feb 8, 2013, at 3:54 PM, John Bradley <[email protected]>
 wrote:

> I think Matt has need of the x5c outside of the JWK.
> 
> Though if you could represent a link to a x5u and a x5c object in a JWK then 
> I guess you might be able to remove them from the base spec.
> 
> I think that is probably part of the discussion we need to have.
> 
> John B.
> 
> On 2013-02-08, at 3:48 PM, Richard Barnes <[email protected]> wrote:
> 
>> Wouldn't it be simpler just to push the x5u and x5c attributes over to JWK, 
>> and leave them out of the base object altogether?  
>> 
>> That actually seems a lot more sensible to me than the current design.  And 
>> it wouldn't require writing another draft!
>> 
>> 
>> On Fri, Feb 8, 2013 at 1:47 PM, Matt Miller (mamille2) <[email protected]> 
>> wrote:
>> After some off-list discussions, a couple of us believe it would be 
>> worthwhile to somehow wrap a PKIX certificate chain in a JSON Web Key.  A 
>> couple of us are leaning toward a new JWK type to do this.  One impact, I 
>> think, is that anywhere we currently have "x5c" (and potentially "x5t" and 
>> "x5u") are effectively replaced by an actual JWK object.  However, a few of 
>> us have other use cases where a PKIX certificate JWK would solve some 
>> problems.
>> 
>> Unless there's strong objection, Brian Campbell and I are likely to start 
>> work on a new I-D that documents our musings.
>> 
>> 
>> Thoughts?
>> 
>> - m&m
>> 
>> Matt Miller < [email protected] >
>> Cisco Systems, Inc.
>> 
>> On Jan 31, 2013, at 3:15 PM, Matt Miller (mamille2) <[email protected]> 
>> wrote:
>> 
>>> I could also see it like the following:
>>> 
>>> {
>>> "kty":"RSA",
>>> "kid":"[email protected]",
>>> "n":".....",
>>> "e":"AQAB",
>>> "x5u":"https://capulet.lit/juliet.crt";
>>> // and/or "x5c":[....]
>>> }
>>> 
>>> Having a "X509" JWK type might solve one problem I can see having in 
>>> XMPP-E2E, but it that same problem could be solved with the above.
>>> 
>>> Then again, I could be completely off in the weeds.
>>> 
>>> 
>>> - m&m
>>> 
>>> Matt Miller < [email protected] >
>>> Cisco Systems, Inc.
>>> 
>>> On Jan 31, 2013, at 2:45 PM, Brian Campbell <[email protected]>
>>> wrote:
>>> 
>>>> John and Mike beat me to it but yeah, the general idea of some kind of X509
>>>> support in JWK has now independently come up in my world twice in as many
>>>> days.
>>>> 
>>>> I must say that, from a general design of things perspective, it seems like
>>>> a total abomination. But maybe, just maybe, it'd be useful enough to
>>>> overcome such pity objections?
>>>> 
>>>> Though, to be fair, Matt's idea is pretty different than what John has in
>>>> mind. Getting to some level of agreement would likely be more than just a
>>>> formality.
>>>> 
>>>> 
>>>> On Thu, Jan 31, 2013 at 9:54 AM, John Bradley <[email protected]> wrote:
>>>> 
>>>>> Brian and I were discussing a couple of options off the list.
>>>>> 
>>>>> One possible thing might be to add x5c and/or x5u elements to jwk.
>>>>> 
>>>>> In Connect we are looking at how to deal with key rollover for signing.
>>>>> 
>>>>> The problem with specifying a x5u is that while it is a vert chain it is a
>>>>> single cert chain, so you need to have multiple and there is no easy way 
>>>>> to
>>>>> have the same keyid for a jwk key and a x5u key.
>>>>> 
>>>>> My idea was to allow x5u elements in a jwk so that you can have a single
>>>>> keyid and key use that apples to both formats.
>>>>> 
>>>>> I can see a use for x5c in jwk as well especially where it is being sent
>>>>> in band.
>>>>> 
>>>>> So while it may sound crazy a number of us may be thinking the same thing.
>>>>> 
>>>>> John B.
>>>>> 
>>>>> On 2013-01-31, at 1:42 PM, "Matt Miller (mamille2)" <[email protected]>
>>>>> wrote:
>>>>> 
>>>>>> 
>>>>>> On Jan 31, 2013, at 9:20 AM, Brian Campbell <[email protected]>
>>>>> wrote:
>>>>>> 
>>>>>>> Seems to me that something like x5c would be a lot more meaningful and
>>>>>>> useful for a possible future ECDH-SS algorithm for JWE. But it would be
>>>>>>> about the encrypting party or sender's certs in that case, right? Which
>>>>>>> would be different than how it's currently being used. And that might be
>>>>>>> another argument for not having it in JWE right now.
>>>>>>> 
>>>>>>> Of course that starts to beg the "must understand headers" question but
>>>>> I
>>>>>>> digress...
>>>>>> 
>>>>>> I was starting to come to similar conclusions.
>>>>>> 
>>>>>> This probably sounds crazy, but maybe we can pretend x.509 certs can be
>>>>> wrapped into a JSON Web Key?
>>>>>> 
>>>>>> {
>>>>>> "kty":"X509",
>>>>>> "x5c": [....]
>>>>>> }
>>>>>> 
>>>>>> 
>>>>>> - m&m
>>>>>> 
>>>>>> Matt Miller < [email protected] >
>>>>>> Cisco Systems, Inc.
>>>>>> 
>>>>>>> On Tue, Jan 29, 2013 at 8:04 PM, John Bradley <[email protected]>
>>>>> wrote:
>>>>>>> 
>>>>>>>> Yes for encryption (Leaving ECDH-SS aside ) the recipoient decrypts
>>>>> with a
>>>>>>>> secret.  I would expect a kid in the header.
>>>>>>>> 
>>>>>>>> I suppose they if the recipient published a x5c that the sender used to
>>>>>>>> encrypt with then you could include the x5c as a reference though a
>>>>>>>> thumbprint would be simpler as the recipient is probably keeping its
>>>>>>>> private keys in a key-store of some sort.
>>>>>>>> 
>>>>>>>> In any event we would minimally want to change that to
>>>>>>>> 
>>>>>>>> "The certificate containing the public key of the entity that is to
>>>>>>>> decrypt the JWE MUST be the first certificate."
>>>>>>>> 
>>>>>>>> 
>>>>>>>> Thanks Brian
>>>>>>>> 
>>>>>>>> John B.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> On 2013-01-29, at 11:08 PM, Brian Campbell <[email protected]
>>>>>> 
>>>>>>>> wrote:
>>>>>>>> 
>>>>>>>> I just noticed a couple of things in the JWE's x5c definition that
>>>>> struck
>>>>>>>> me as maybe not right.
>>>>>>>> 
>>>>>>>> From
>>>>>>>> 
>>>>> http://tools.ietf.org/html/draft-ietf-jose-json-web-encryption-08#section-4.1.9
>>>>>>>> 
>>>>>>>> "The certificate containing the public key of the entity that encrypted
>>>>>>>> the JWE MUST be the first certificate." - but it's not the public key
>>>>> of
>>>>>>>> the entity that encrypted, is it? It's the public key of the entity
>>>>> that
>>>>>>>> will decrypt. The other entity.
>>>>>>>> 
>>>>>>>> "The recipient MUST verify the certificate chain according to [RFC5280]
>>>>>>>> and reject the JWE if any validation failure occurs." - maybe I'm
>>>>> missing
>>>>>>>> something but why would the recipient verify it's own certificate
>>>>> chain?
>>>>>>>> 
>>>>>>>> And the first hyperlink in "See Appendix B<
>>>>> http://tools.ietf.org/html/draft-ietf-jose-json-web-encryption-08#appendix-B>of
>>>>> [
>>>>>>>> JWS<
>>>>> http://tools.ietf.org/html/draft-ietf-jose-json-web-encryption-08#ref-JWS
>>>>>> ]
>>>>>>>> for an example "x5c" value" takes you to Appendix B of JWE, which is
>>>>>>>> Acknowledgements, rather than JWS as the text would suggest.
>>>>>>>> 
>>>>>>>> So all those little nits could be fixed. But maybe it'd be better to
>>>>> just
>>>>>>>> remove x5c from JWE all together? As Richard pointed out previously,
>>>>>>>> http://www.ietf.org/mail-archive/web/jose/current/msg01434.html,
>>>>> there's
>>>>>>>> really no point in sending a whole chain to help the recipient
>>>>> identify its
>>>>>>>> own key.
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> jose mailing list
>>>>>>>> [email protected]
>>>>>>>> https://www.ietf.org/mailman/listinfo/jose
>>>>>>>> 
>>>>>>>> 
>>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> jose mailing list
>>>>>>> [email protected]
>>>>>>> https://www.ietf.org/mailman/listinfo/jose
>>>>>> 
>>>>> 
>>>>> 
>>> 
>>> _______________________________________________
>>> jose mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/jose
>> 
>> 
>> _______________________________________________
>> jose mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/jose
>> 
>> 
>> _______________________________________________
>> jose mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/jose
> 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to