A possible wording addition to remove any potential ambiguity is proposed 
inline below…

From: Mike Jones [mailto:[email protected]]
Sent: Tuesday, September 30, 2014 11:45 AM
To: Kathleen Moriarty
Cc: Alissa Cooper; The IESG; [email protected]; [email protected]; 
[email protected]
Subject: RE: Alissa Cooper's No Objection on 
draft-ietf-jose-json-web-algorithms-33: (with COMMENT)

Replies to your questions are inline below, Kathleen.

From: Kathleen Moriarty [mailto:[email protected]]
Sent: Monday, September 29, 2014 7:42 PM
To: Mike Jones
Cc: Alissa Cooper; The IESG; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: Re: Alissa Cooper's No Objection on 
draft-ietf-jose-json-web-algorithms-33: (with COMMENT)



Sent from my iPhone

On Sep 29, 2014, at 6:42 PM, Mike Jones 
<[email protected]<mailto:[email protected]>> wrote:

Thanks for your review, Alissa.  I’ve added the working group to this thread so 
they're aware of your comments.  Replies are inline below…



-----Original Message-----
From: Alissa Cooper [mailto:[email protected]]
Sent: Sunday, September 28, 2014 2:30 PM
To: The IESG
Cc: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: Alissa Cooper's No Objection on 
draft-ietf-jose-json-web-algorithms-33: (with COMMENT)



Alissa Cooper has entered the following ballot position for

draft-ietf-jose-json-web-algorithms-33: No Objection



When responding, please keep the subject line intact and reply to all email 
addresses included in the To and CC lines. (Feel free to cut this introductory 
paragraph, however.)





Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html

for more information about IESG DISCUSS and COMMENT positions.





The document, along with other ballot positions, can be found here:

http://datatracker.ietf.org/doc/draft-ietf-jose-json-web-algorithms/







----------------------------------------------------------------------

COMMENT:

----------------------------------------------------------------------



== Section 3.4 ==

"Signing and validation with the ECDSA P-384 SHA-384 and ECDSA P-521

  SHA-512 algorithms is performed identically to the procedure for

  ECDSA P-256 SHA-256 -- just using the corresponding hash algorithms

  with correspondingly larger result values.  For ECDSA P-384 SHA-384,

  R and S will be 384 bits each, resulting in a 96 octet sequence.  For

  ECDSA P-521 SHA-512, R and S will be 521 bits each, resulting in a

  132 octet sequence."



For the ECDSA P-521 SHA-512 case, how does the result amount to 132 octets? Is 
there padding inserted into R and S?



The P-521 curve uses 521-bit R and S values.  It takes 66 octets to represent 
521 bits.  There are two 66-octet values, hence 132 octets.


Mike,

I may be missing something too... It looks like there is a little padding as 
the info in the draft gets to 65.1 as opposed to 66.  I think that's what 
Alissa was getting at.  How is that handled?

You’re right that there is 7 bits of zero-valued padding in the highest-order 
bits of the octet sequence representations of both values when using 521-bit 
integers.  This allows each to be represented in separate octet sequences that 
represent big-endian integers.  This padding is specified in [SEC1].  Step two 
of this section includes this text about the integer-to-octet string conversion:

       The values R
       and S are represented as octet sequences using the Integer-to-
       OctetString Conversion defined in Section 
2.3.7<https://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-33#section-2.3.7>
 of SEC1 
[SEC1<https://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-33#ref-SEC1>]
       (in big endian octet order).


Thinking about it some more, we could add the following parenthetical remark 
after the sentence “For ECDSA P-521 SHA-512, R and S will be 521 bits each, 
resulting in a 132 octet sequence” to remove any possible ambiguity:



(Note that the Integer-to-OctetString Conversion defined in Section 2.3.7 of 
SEC1 [SEC1] used to represent R and S as octet sequences adds zero-valued 
high-order padding bits when needed to round the size up to a multiple of 8 
bits; thus, each 521-bit integer is represented using 528 bits in 66 octets.)



Would that work for people?  It may be overkill, given the reference to SEC1 
two paragraphs earlier, but it should be 100% clear.

Also, is there space allocated for the "." Separators or is that not necessary?

The base64url encoded signature value contains no “.” character.  The binary 
signature value consists of the concatenation of the two octet sequences 
representing R and S, which are of a known fixed length for each particular 
curve.

Thanks,
Kathleen

== Section 7 ==



Do we use [email protected]<mailto:[email protected]>? I usually use 
[email protected]<mailto:[email protected]>.



== Section 8.4 ==

"An Initialization Vector value MUST never be used multiple times with

   the same AES GCM key."



I think what was intended here was s/MUST never/MUST NOT/



Agreed.  To keep the same level of emphasis, I propose to change “MUST never” 
to “MUST NOT ever”.



                                                            -- Mike


_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to