Or to add another link for the rest of us:

http://tools.ietf.org/html/draft-jones-json-web-encryption

I found the presentation to be a little sketchy.  The table is difficult to 
parse.  I think that the table is constraining how you describe the parameters, 
and I'm concerned that underspecification here will hurt.  The second and third 
columns don't seem to add much over the description (the second column is all 
"string").  I'd suggest that you give each parameter a numbered section.  That 
way, they appear in the TOC.

The x5u parameter identifies what exactly?  Is it the URI for a resource that, 
upon retrieval (e.g., HTTP GET), produces an X.509 certificate (chain)?  I 
think that's what you mean.  The example seems to use base64url encoding, which 
seems pointless.

"Utilizing TLS" also needs to be expanded.  You obviously need to ensure that 
the authority providing the resource is authenticated and that the 
representation you retrieve is free from modification, so say that.

The "typ" parameter seems a little underspecified.

The epk parameter isn't a string by its description, though the table indicates 
that it is.  ...unless you wanted to base64url encode the JSON object.

The alg and enc parameters use StringOrURI as their definition.  There are no 
URIs defined for either.  I suspect that there is something in there you are 
wanting to get at, but I recommend that just "String" is sufficient.  After 
all, someone is going to have to decide if "alg": "http://foo"; is equal to 
"alg": "HTTP://FOO" and I don't want to have to be that guy.  Saying that you 
character-wise compare the strings for equality is really, really good.

That doesn't preclude the definition of a scheme where URIs are used to prevent 
collisions in the namespace, but I suspect that your existing text on 
public/private use of codes is sufficient.

BTW, I like your decision to make all parameters mandatory.  This is less a 
concern with encryption as it is with signature, but it seems like it's better 
to be consistent across the two.

--Martin

On 2011-09-07 at 14:37:56, Mike Jones wrote:
> I'm pleased to announce the publication of the first draft 
> <http://self-issued.info/docs/draft-jones-json-web-encryption-00.html>
> of the JSON Web Encryption (JWE)
> <http://self-issued.info/docs/draft-jones-json-web-encryption.html>
> specification. It enables JSON-based encryption of content in a 
> parallel manner to how the JSON Web Signature (JWS) <http://self- 
> issued.info/docs/draft-jones-json-web-signature.html>
> specification enables JSON-based signing of content.
> 
> My thanks to John Bradley, Nat Sakimura, Eric Rescorla, and Joe 
> Hildebrand for helping make this initial version a reality!
> 
> The specification is available at these locations:
> 
> *
> http://www.ietf.org/internet-drafts/draft-jones-json-web-encryption-
> 00.t
> xt
> 
> *
> http://www.ietf.org/internet-drafts/draft-jones-json-web-encryption-
> 00.x
> ml
> 
> *
> http://self-issued.info/docs/draft-jones-json-web-encryption-00.html
> 
> *
> http://self-issued.info/docs/draft-jones-json-web-encryption-00.txt
> 
> *
> http://self-issued.info/docs/draft-jones-json-web-encryption-00.xml
> 
> *
> http://self-issued.info/docs/draft-jones-json-web-encryption.html
> (will point to new versions as they are posted)
> 
> *
> http://self-issued.info/docs/draft-jones-json-web-encryption.txt (will 
> point to new versions as they are posted)
> 
> *
> http://self-issued.info/docs/draft-jones-json-web-encryption.xml (will 
> point to new versions as they are posted)
> 
> *
> http://svn.openid.net/repos/specifications/json_web_encryption/1.0/
> (Subversion repository, with html, txt, and html versions available)
> 
> 
> 
> I also posted about this at http://self-issued.info/?p=538 
> <http://self-issued.info/?p=538> .
> 
> 
> 
>                                                             -- Mike
> 
> 



_______________________________________________
woes mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/woes

Reply via email to