Inline:

On Tue, May 16, 2023 at 10:33 PM John Mattsson <john.mattsson=
[email protected]> wrote:

> Hi,
>
>
> The three adopted drafts have been uploaded with new names.
>
>
>
> https://datatracker.ietf.org/doc/draft-ietf-jose-json-proof-algorithms/
>

It would be nice to see an initial table for the requested registry similar
to how HPKE established registries:

https://www.rfc-editor.org/rfc/rfc9180.html#name-algorithm-identifiers
https://www.rfc-editor.org/rfc/rfc9180.html#name-kem-identifiers

Similarly for any new reserved claims ( such as pjwk ), it would be nice to
see them all in one place.

Assume the reader has some awareness of JOSE, and introduce terms like
"issuer_header" and "presentation_header"

so that they defined in their sections, for example:

https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-proof-algorithms-00#name-presentation-protected-header-2

does not include "presentation_header" header.

For single use JWS, it seems odd that the header value must be static,
since I assume that the alg used is recoverable... from the issuer
protected header... we all know why, but it's sorta sad here... there
should have been a way to learn the algorithm out of band...
https://www.rfc-editor.org/rfc/rfc7515#page-10 ... this will add a lot of
wasted bytes for large claim sets....

An example with a mixed algorithm for issue and holder would be nice here,
or a comment about it being forbidden... for example issuer signing with
ES256 and holder presenting with EdDSA.

I find myself really wanting JSON and base64url encoded examples as I read
this, the section on BBS is much easier to understand because of the
examples.

The mac section has the same issue as the su section, repeating a static
header:

jws_header = '{"alg":"ES256"}'

The MAC section took a few reads to understand, diagrams would help here.

The snark section adds nothing currently, and given the scope / breadth and
maturity of these 3 drafts, I suggest it be dropped and the focus be on the
3 existing schemes.


> https://datatracker.ietf.org/doc/draft-ietf-jose-json-web-proof/
>

I didn't really learn anything new from this document, after reading the
first one,

You might want to change https://issuer.tld to issuer.example, similar
updates to other example email addresses...

In the proof_jwk and presentation_jwk, perhaps some comments on
constraining keys using "alg"... I find myself wondering which keys are for
ES256 and which ones are for SU-ES256, alg remains optional in JWK, but it
would help explain the relationships here...

BTW the merkle disclosure proofs work as moved to an I-D:

https://datatracker.ietf.org/doc/draft-steele-cose-merkle-tree-proofs/

We have a section on multiple disclosure proofs:

https://ietf-scitt.github.io/draft-steele-cose-merkle-tree-proofs/draft-steele-cose-merkle-tree-proofs.html#name-signed-multiple-inclusion-p

I prepared an implementation of RFC9162 to support this recently:
https://github.com/transmute-industries/rfc9162

That being said, I suggest maybe not addressing merkle proofs in the first
version of JWP, and focus on supporting the 3 JPA in the algorithms draft.


> https://datatracker.ietf.org/doc/draft-ietf-jose-json-proof-token/
>

This document is extremely light.... It would be nice to see:

1. complete JPT examples for 3 algorithms
2. appendix / use case commentary on why not COSE Sign 1  / JWS / JWT...

I know there has been lots of discussion on point 2, it would be good to
see it reflected in this document.

Which registry will contain "claims", is there generic language that can be
written for explaining how:

https://www.iana.org/assignments/jose/jose.xhtml

registry entries are interpreted in these drafts?

For example, JWK is being shared... but the "alg" values might not match up
for SU-ES256 vs ES256 etc...

Another thought, can the recursive destructing algorithm from SD-JWT be
used here?

It might be nice to not have to think in terms of arrays, the original JWT
claim set was an object, not an array.

Thanks for taking the time to put these documents together, I hope I can be
of further assistance.


>
> It would be very welcome with reviews and comments on the drafts. I don’t
> think we have gotten any comments so far except that they should be adopted.
>
> It would also be very welcome if someone starts “An Informational document
> detailing Use Cases and Requirements for new specifications enabling
> JSON-based selective disclosure and zero-knowledge proofs.” in some form.
>
> Cheers,
> John
>
>
>
> *From: *John Mattsson <[email protected]>
> *Date: *Thursday, 20 April 2023 at 08:23
> *To: *[email protected] <[email protected]>
> *Subject: *Re: Calls for adoption: Web Proof Drafts
>
> Dear JOSE,
>
>
>
> I have not talked to my co-chairs but it is obvious that there is
> overwhelming support to adopt the three Web Proof Drafts. The results in
> the IETF 116 session and on the list were unanimous in favor of adopting
> the three drafts.
>
>
>
> Authors, please rename the I-D to and resubmit as
>
>
>
> draft-ietf-jose-json-web-proof-00
>
> draft-ietf-jose-json-proof-algorithms-00
>
> draft-ietf-jose-json-proof-token-00
>
>
>
> John Preuß Mattsson (for the three jose chairs)
>
>
>
> *From: *jose <[email protected]> on behalf of Brent Zundel
> <[email protected]>
> *Date: *Wednesday, 29 March 2023 at 16:18
> *To: *Karen O'Donoghue <[email protected]>,
> [email protected] <[email protected]>
> *Subject: *Re: [jose] Calls for adoption: Web Proof Drafts
>
> I support adoption and volunteer to review and help write.
>
>
>
> Sent from my T-Mobile 5G Device
> Get Outlook for Android <https://aka.ms/AAb9ysg>
> ------------------------------
>
> *From:* jose <[email protected]> on behalf of Karen O'Donoghue
> <[email protected]>
> *Sent:* Tuesday, March 28, 2023 12:54:06 PM
> *To:* [email protected] <[email protected]>
> *Subject:* [jose] Calls for adoption: Web Proof Drafts
>
>
>
> jose working group…
>
>
>
> Yesterday during the jose meeting @ IETF 116, we did a consensus call on
> the adoption of the three web proof drafts:
>
> JSON Web Proofs
> https://datatracker.ietf.org/doc/draft-jmiller-jose-json-proof-algorithms/
> JSON Proof Algorithms
> https://datatracker.ietf.org/doc/draft-jmiller-jose-json-proof-algorithms/
> JSON Proof Token
> https://datatracker.ietf.org/doc/draft-jmiller-jose-json-proof-token/
>
> The result was unanimous in favor of adopting the three drafts. With this
> message, I am asking the mailing list for any thoughts on adopting these
> three drafts. This call will close on Wednesday 19 April.
>
>
>
> Also, this is an excellent time to read the drafts and start providing
> comments.
>
>
>
> Karen (for the three jose chairs)
> _______________________________________________
> jose mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/jose
>


-- 
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://www.transmute.industries>
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to