JOSE Working Group 7 November 2013, 0900-1130 PST IETF 88 Vancouver.

Slides:



Advertisements
Similar presentations
IETF Calsify.
Advertisements

Secure Telephone Identity Revisited STIR IETF 88.
STRAW IETF#91, Honolulu, USA. Victor Pascual Christer Holmberg.
Deterministic Networking (DetNet) BoF IETF 91 Monday Afternoon Session II, Coral 1.
L2VPN WG “NVO3” Meeting IETF 82 Taipei, Taiwan. Agenda Administrivia Framing Today’s Discussions (5 minutes) Cloud Networking: Framework and VPN Applicability.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
PPSP Working Group IETF-89 London, UK 16:10-18:40, Tuesday, Webex: participation.html.
CCAMP Working Group Online Agenda and Slides at: Tools start page:
DRINKS Interim („77.5“) Reston, VA Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF.
IETF 90: NetExt WG Meeting. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet- Draft.
IETF-89 AQM WG Wesley Eddy Richard Scheffenegger
Emergency Context Resolution with Internet Technologies (ecrit) IETF 76, Hiroshima Nov 11, 2009 Hannes Tschofenig Marc Linsner (attending virtually) Roger.
L3VPN WG IETF 78 09/11/ :00-15:00 Chairs: Marshall Eubanks Danny McPherson Ben Niven-Jenkins.
SIPCLF Working Group Spencer Dawkins Theo Zourzouvillys IETF 76 – November 2009 Hiroshima, Japan.
IETF #82 DRINKS WG Meeting Taipei, Taiwan Fri, Nov 18 th
Transport Layer Security (TLS) IETF-72, Dublin July 27, 2008 Chairs: Eric Rescorla Joseph Salowey.
EAP Method Update (EMU) IETF-79 Chairs Joe Salowey Alan DeKok.
CLUE WG IETF-91 Paul Kyzivat (WG co-chair) Mary Barnes (WG co-chair)
1 NOTE WELL Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
GROW IETF 78 Maastricht, Netherlands. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
IETF 86 PIM wg meeting. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC.
IETF 79 - Beijing, China1 Martini Working Group IETF 79 Beijing Chairs: Bernard Spencer
Extensible Messaging and Presence Protocol (XMPP) WG Interim Meeting, Monday, January 7,
IPPM WG IETF 79. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and.
Tictoc working group Thursday, 28 July – 1720 EDT (1920 – 2120 UTC) Karen O’Donoghue and Yaakov Stein, co-chairs.
SIPREC WG, IETF# , GMT+2 John Elwell (WG co-chair) Brian Rosen (WG co-chair)
CCAMP Working Group Online Agenda and Slides at: Data tracker:
Web Authorization Protocol (oauth) IETF 90, Toronto Chairs: Hannes Tschofenig, Derek Atkins Responsible AD: Kathleen Moriarty Mailing List:
Web Authorization Protocol (oauth) Hannes Tschofenig.
Transport Service (TAPS) Aaron Falk
IETF DRINKS Interim Meeting (#82.5) Virtual Interim Meeting Wed, Feb 1 st p-6p UTC/9a-1p Eastern.
CLUE WG IETF-83 Mary Barnes (WG co-chair) Paul Kyzivat (WG co-chair)
Mary Barnes (WG co-chair) Cullen Jennings (WG co-chair) DISPATCH WG IETF 90.
OAuth WG Blaine Cook, Hannes Tschofenig. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
Authentication and Authorization for Constrained Environment (ACE) WG Chairs: Kepeng Li, Hannes
IETF 89, LONDON, UK LISP Working Group. 2 Agenda and slides:  lisp.html Audio Stream 
Audio/Video Transport Extensions (AVTEXT). Administrivia Notetakers? Jabber scribe? Jabber ChatRoom
IETF – NVO3 WG Virtual Interim Meeting Chairs: Secretary: Sam Aldrin Benson Schliesser Matthew Bocci.
DNSEXT at IETF-83 Paris 2012/3/27 at 17:10 – 18:10 Ólafur Guðmundsson Andrew Sullivan.
DMM WG IETF 84 DMM WG Agenda & Status Tuesday, July 31 st, 2012 Jouni Korhonen, Julien Laganier.
LMAP WG IETF 92, Dallas, TX Dan Romascanu Jason Weil.
Transport Layer Security (TLS) IETF-84 Chairs: Eric Rescorla Joe Salowey.
Interface to the Routing System (IRS) BOF IETF 85, Atlanta November 2012.
IPR WG IETF 62 Minneapolis. IPR WG: Administrivia Blue sheets Scribes Use the microphones Note Well.
IETF #81 - NETCONF WG session 1 NETCONF WG IETF 81, Quebec City, Canada MONDAY, July 25, Bert Wijnen Mehmet Ersue.
Transport Layer Security (TLS) IETF 73 Thursday, November Chairs: Eric Rescorla Joe Salowey.
AVTEXT Keith Drage Magnus Westerlund
Transport Layer Security (TLS) IETF-78 Chairs Joe Salowey Eric Rescorla
HIP WG Gonzalo Camarillo David Ward IETF 80, Prague, Czech Republic THURSDAY, March 31, 2011, Barcelona/Berlin.
OPSREA Open Meeting Area Directors: Dan Romascanu and Ron Bonica Monday, March 28, 2011 Morning Session, 10:30 – 11:30, Room Barcelona/Berlin Discussion.
Agenda Behcet Sarikaya Dirk von Hugo November 2012 FMC BOF IETF
IETF #82 - NETCONF WG session 1 NETCONF WG IETF 82, Taipei, Taiwan TUESDAY, November 15, Afternoon Session III Bert Wijnen Mehmet Ersue.
IETF #85 - NETCONF WG session 1 NETCONF WG IETF 85, Atlanta, USA WEDNESDAY, November 7, Bert Wijnen Mehmet Ersue.
Agenda Stig Venaas Behcet Sarikaya November 2011 Multimob WG IETF
Alternatives to Content Classification for Operator Resource Deployment (ACCORD) BOF Chairs: Gonzalo Camarillo & Pete Resnick.
TSVAREA IETF84 - Vancouver. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
OPSAWG chairs: Scott Bradner Christopher Liljenstolpe.
STIR Secure Telephone Identity Revisited
LMAP WG IETF 97 – Seoul, SK November 17, 2016 Dan Romascanu Jason Weil
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Joint TICTOC and NTP Meeting
MODERN Working Group IETF 97 November 14, 2016.
Kathleen Moriarty, Trusted Execution Environment Provisioning (TEEP) BoF IETF-100 November 2017 Chairs: Nancy Cam-Winget,
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Thursday, 20th of July 2017.
JSON Object Signing and Encryption (JOSE) Working Group
Flexible Ethernet (Side meeting)
TEAS CCAMP MPLS PCE Working Groups
SIPBRANDY Chair Slides
Scott Bradner & Martin Thomson
Presentation transcript:

JOSE Working Group 7 November 2013, PST IETF 88 Vancouver

Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made within the context of an IETF activity is considered an "IETF Contribution". Such statements include oral statements in IETF sessions, as well as written and electronic communications made at any time or place, which are addressed to: – The IETF plenary session – The IESG, or any member thereof on behalf of the IESG – Any IETF mailing list, including the IETF list itself, any working group or design team list, or any other list functioning under IETF auspices – Any IETF working group or portion thereof – Any Birds of a Feather (BOF) session – The IAB or any member thereof on behalf of the IAB – The RFC Editor or the Internet-Drafts function All IETF Contributions are subject to the rules of RFC 5378 and RFC 3979 (updated by RFC 4879). Statements made outside of an IETF session, mailing list or other function, that are clearly not intended to be input to an IETF activity, group or function, are not IETF Contributions in the context of this notice. Please consult RFC 5378 and RFC 3979 for details. A participant in any IETF activity is deemed to accept all IETF rules of process, as documented in Best Current Practices RFCs and IESG Statements. A participant in any IETF activity acknowledges that written, audio and video records of meetings may be made and may be available to the public.

Agenda Administrivia and Agenda Bashing Open issue resolution Issues to be discussed include: #54, #55, #141 #74-C #77 #93 #114-C Schedule and next steps (Chairs) Cookbook document Virtual interim schedule

Summary Issue Status draft-ietf-jose-use-cases IESG processing JWS, JWE, JWK, JWA Issue Resolution Total Issues = 185 (many with multiple parts) Remaining Open Issues = 56 (Closed Issues = 129) Co-chairs and editor have had several meetings this week and previously resulting in agreements for 49 issues: Awaiting editor implementation, Awaiting implementation verification, or Awaiting external input or verification. Issues for discussion today – 7 !

#54, #55, #141 #54 (JWA) epk/apu/apv need to be REQUIRED #55 (JWA) Mandatory entropy in ECC KDF inputs #141 (JWS) Section "crit" (Critical) Header Parameter concat issue archive/web/jose/current/msg03542.html

#74-C (JWK) #74-C (JWK) Section "x5u" (X.509 URL) Header Parameter What happens if this JWK has only an x5u member in it? Is this a legal construct? How does one say that this matches the bare public key? Question: Is there a minimum set of fields which must be present in the JWK?

#77 #77 – (JWK) Section 3.7 "x5c" (X.509 Certificate Chain) Parameter We currently require things to be presented as chains, but generally things are presented as bags Should we change from chains to bags? If we stay with chains, what happens to partial chains (are they legal)?

#93 #93 (JWS) There should be a new - informational - appendix added to this document that describes how to go from the various fields or lack of fields to get a key. This should include all of the methods of finding keys that Mike has described to me over the duration of this project. This would be everything from following a jku to the application provides a method to find the key. The description should contain a series of steps and a description of what information is retrieved by doing this. Jim Schaad and Richard Barnes provided proposals (see following slides): Non-normative appendix to JWS

Jim Schaad proposal: A. Look for certificates: a. Identify an EE certificate and a certificate list i. Is there an x5u? Follow the link and down load the certificates to get a certificate list and set the EE certificate to the zero-th entry in the list ii. Is there an x5t? Locate the EE certificate in local storage and set the certificate list to that certificate iii. Is there an x5c? Set the EE certificate to the first item in the list. Set the certificate list to the array of certificates. b. Do path building from the EE certificate to a trusted root using the certificate list and local certificate stores. c. Validate the path to a trust point B. Look for JWK Sets a. Create an empty JWK set KEYS b. Is there a jku? Down load from the pointer and add to KEYS we are maintaining. c. Is there a jkw? Add it to KEYS d. Are there application JWKs? Add them to KEYS e. Are there local JWKs? Add them to KEYS C. Find viable keys in KEYS a. Is there a kid? Remove items from KEYS which have a kid and it does match, leave items with kid value in the KEYS b. Remove items from KEYS based on the algorithm in the alg member. If a key element in KEYS does not support the algorithm, remove it. This examines the ‘kty’ member and the ‘alg’ member if it is present. c. Remove items from KEYS based on the use member. If a key element in KEYS has a use member and it does not match the required use for the JOSE element, remove it from KEYS. D. Check each of the key values in KEYS to see if it validates/decrypts the object.

Richard Barnes proposal: # Look for self-describing keys (jwk, jku, x5c, x5u), then look for key references (kid, x5t) 0. Initialize KEYS to the empty set 1.If a key has been speciified by the application for use with this object, add that key to KEYS 2. If "jwk" in header, add value to KEYS 3. If "jku" in header, fetch URL and add all JWKs in set to KEYS 4. If "x5c" in header, extract public key and add to KEYS (or corresponding private key, if present) 5. If "x5u" in header, fetch URL and process first certificate as "x5c” 6. If "kid" in header and "kid" value represents a known key, add corresponding key to KEYS 7. If "x5t" in header and "x5t" value matches a known cert, add corresponding key to KEYS

#114-C #144-C (JWS) Section "crit" (Critical) Header Parameter Question: If an extension is placed in a “crit” header, must that extension also be signed?

Next Steps Cookbook document Expected editor’s drafts: In the next week or so, all normative changes incorporated In the next month or so, all remaining editorial changes Proposed tentative virtual interim 13 January 2014