I would think that the financial community would want a reliable signature 
method, without the interop problems that relying on canonicalization creates, 
as so thoroughly demonstrated in practice by XML Canonicalization.  For 
starters, there isn't actually a JSON canonicalization standard in the first 
place.  And relying on intermediaries not modifying the JSON in any way is also 
fraught with danger and an invitation to attacks.

Would using JWS with detached payloads really be that onerous for this 
community, provided they actually have a way to preserve the payload exactly?

                                -- Mike

-----Original Message-----
From: jose [mailto:[email protected]] On Behalf Of Anders Rundgren
Sent: Monday, August 10, 2015 10:07 PM
To: Jim Schaad; [email protected]
Subject: Re: [jose] Payment Perspective on 
draft-jones-jose-jws-signing-input-options 00

On 2015-08-10 23:00, Jim Schaad wrote:
> I am just not interested in this I guess.

Yes, the JOSE WG have more or less unanimously decided to ignore the needs of 
the financial community who wants to sign JSON objects [1] rather than signing 
arbitrary data using JSON-based signature containers.

Anders

1] Although entirely different with respect to JSON normalization, the 
following independently developed schemes proposals seem to support this 
statement:

https://web-payments.org/specs/source/vocabs/security.html#GraphSignature2012
https://cyberphone.github.io/openkeystore/resources/docs/jcs.html#Sample_Signature

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to