That's good text - thanks.  I'll incorporate it in the next revision.

                                                            -- Mike

From: jose [mailto:[email protected]] On Behalf Of Jim Schaad
Sent: Saturday, January 04, 2014 11:58 AM
To: Mike Jones; [email protected]
Subject: Re: [jose] Web-Signature-10 - Appendix D - Notes on validation key 
selection

I don't see why this cannot be addressed by good introductory text.

This is an information appendix that presents one of a large number of possible 
ways to deal with determining which keys  are to be used for communicating with 
other individuals for both encrypting messages and validating signed and MAC 
messages. The algorithm that is presented here is designed to be relatively 
complete in order to give good guidance about the types of issues that need to 
be considered in performing the selection of keys and additional criteria that 
may need to be included in the process of selecting keys.  The order and 
inclusion of steps in this algorithm does not mean that they need to be 
performed in this order or that they are required in all contexts.   Specific 
applications will frequently have a much simpler method of determining the keys 
as there may be one or two choices that are profiled for use.

From: Mike Jones [mailto:[email protected]]
Sent: Friday, January 03, 2014 4:51 PM
To: Jim Schaad; [email protected]<mailto:[email protected]>
Subject: RE: [jose] Web-Signature-10 - Appendix D - Notes on validation key 
selection

The algorithms are the combinatorial combinations of the key selection steps in 
the bullets of 
http://tools.ietf.org/html/draft-ietf-jose-json-web-signature-19#appendix-D, 
including applying them in different orders.  As I see it, suggesting a 
particular order or requiring that particular steps be performed would be going 
too far, as it would appear to be verging on normative requirements, where 
there actually are none.

If you want us to say that the algorithms are as described in the first 
sentence of this note, if you believe that would make things more clear, I can 
do that.

                                                            -- Mike

From: jose [mailto:[email protected]] On Behalf Of Jim Schaad
Sent: Friday, January 03, 2014 3:13 PM
To: [email protected]<mailto:[email protected]>
Subject: [jose] Web-Signature-10 - Appendix D - Notes on validation key 
selection

I am not happy with the text a that is in this section.  I think it completely 
misses what I was suggesting to do in the mail message that I sent and I am not 
sure that it captures what Richard suggested either.  Among other things it 
seems to talk about a number of algorithms but there are no actual algorithms 
presented in the text.  Nor does it deal with any of the issues about needing 
to filter based on attributes and algorithms in any meaningful way.

Jim

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to