Hello Jose WG,
I just review the WG document in the effort of understanding the features
that are being addressed and the inter-WG possible interoperability
capabilities and / or issues. I have to apologize for not being able to
participate to the WG efforts before.
Unfortunately, it seems (IMHO) that much of the previous work that has been
done in the security area, most noticeable by the PKIX WG, has been
practically ignored. In particular (and please forget me if I am raising
points that have already been addressed in the past - if so, please provide
me with references so that I can understand these choices), here's the
overall general issues that I found throughout the documents:
- *Duplication of Registration for Algorithm Identifiers
(cross-application).* This is particularly bad because the use of text
identifiers (even if it is specified that they should be unique), might be
"overloaded" in their usage because of the chosen names. Those identifiers
(as today written in the docs) are similar to the description, rather than
IDs
- *Format-Dependent content protection* - This seems to be an
over-engineering of the format where not needed - i.e., content is content,
not JSON without spaces on one line content.
- *Algorithm Agility* - I find it odd that, with all the work that has
been done in the past for moving from specifying algorithm to providing
specs for extensible algorithms field has been ignored (e.g., fixed SHA-1
and SHA-256 specification for certificate identifiers
- *Interoperability with PKIX formats.* No effort, AFAIK, has been done
(at least reflected in the documents) about format translation from the
structures used from the PKIX group into JSON - that would provide a more
useful tool for integrating JSON into existing cryptographic libraries
(ease of deployment and format interoperability)
Last, I found it very weird the following notation:
ASCII(BASE64(…))
since the BASE64 is an ASCII representation, what does the ASCII() specs
mean in this case and why it is needed?
Best Regards,
Dr. Pala
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose