Stephen,

How does rfc6920 help when the key is a jwk? Like sub_jwk below.

-Axel

{
   "iss": "https://self-issued.me";,
   "sub": "NzbLsXh8uDCcd-6MNwXF4W_7noWXFZAfHkxZsRGC9Xs",
   "aud": "https://client.example.org/cb";,
   "nonce": "n-0S6_WzA2Mj",
   "exp": 1311281970,
   "iat": 1311280970,
   "sub_jwk": {
     "kty":"RSA",
     "n": "0vx7agoebGcQSuuPiLJXZptN9nndrQmbXEps2aiAFbWhM78LhWx
     4cbbfAAtVT86zwu1RK7aPFFxuhDR1L6tSoc_BJECPebWKRXjBZCiFV4n3oknjhMs
     tn64tZ_2W-5JsGY4Hc5n9yBXArwl93lqt7_RN5w6Cf0h4QyQ5v-65YGjQR0_FDW2
     QvzqY368QQMicAtaSqzs8KJZgnYb9c7d0zgdAZHzu6qMQvRL5hajrn1n91CbOpbI
     SD08qNLyrdkt-bFTWhAI4vMQFh6WeZu0fM4lFd2NcRwr3XPksINHaQ-G_xBniIqb
     w0Ls1jF44-csFCur-kEgU8awapJzKnqDKgw",
     "e":"AQAB"
    }
  }

-----Original Message-----
From: jose [mailto:[email protected]] On Behalf Of Stephen Farrell
Sent: Friday, January 23, 2015 1:39 PM
To: Jim Schaad; [email protected]
Subject: Re: [jose] Working Group last call on draft-ietf-jose-jwk-thumbprint



I just had a quick look and it seems fine for asymmetric keys assuming there's 
a need for it and a justification for including things like '{"e":' in the hash 
input, which I don't see.

The reason I looked at this is that there's some overlap here with RFC6920, 
(I'm an author of
that) and DANE and maybe other specs that say how to hash a public key.

It does seem a shame to have so many ways to hash public keys, but 6920 is 
compatible with DANE and others that hash a SPKI (even if that's artificially 
created just as a hash input), so I wonder if the benefit of the running code 
here is really worth being different from other specs that hash a SPKI.

So, other than that someone has some code, what is the benefit of being 
incompatible with other specs here?

The downside is that I could not determine that one of these does/doesn't map 
to the same public key as some DANE RRs for example.
Seems a bit odd to me to want to accept that downside unless there's an upside.

Only other thing is for symmetric keys I think you should add an optional salt, 
in case you need the thumbprint of a low-entropy secret, which is quite likely 
to happen, and quite likely to get exposed somehow. And I'd argue to recommend 
that a long salt always be used for potentially low-entropy secret keys.

Apologies if the WG discussed these before but I missed it;-)

S.

PS: These are just random-punter comments with no hats.

On 23/01/15 01:56, Jim Schaad wrote:
> This starts a two week last call on draft-ietf-jose-jwk-thumbprint.  
> Last call will end on February 2, 2015.
> 
>  
> 
> Due to the general lack of activity on the list.  General silence will 
> be considered as a vote to park the document and either have it done 
> via the ISE or with an AD shepherd rather than having group consensus.
> 
>  
> 
>  
> 
> 
> 
> 
> _______________________________________________
> jose mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/jose
> 

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to