On Fri, Jun 13, 2014 at 6:15 PM, Mike Jones <michael.jo...@microsoft.com>
wrote:

>  Responses to the Security Considerations wording issue are inline below
> (with the text unrelated to this issue removed for brevity)…
>
Thanks!

>
>
> *From:* Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com]
> *Sent:* Friday, June 13, 2014 2:08 PM
>
> *To:* Mike Jones
> *Cc:* jose@ietf.org
> *Subject:* Re: [jose] AD review of draft-ietf-jose-json-web-algorithms
>
>
>
> On Fri, Jun 13, 2014 at 4:26 PM, Mike Jones <michael.jo...@microsoft.com>
> wrote:
>
> I didn’t reword the introductions.  I thought that your issue was that you
> wanted additional security considerations to be described, which has now
> been done.  I’ll go back and re-read your comments and see if I can work
> out what additional changes you were requesting there.
>
>
>
> Thank you, when you go back you'll see the request was two-fold.  Thanks,
> I think it will help the intro read better!
>
>
>
>       >> Security Considerations: While it is true the content is covered
> in
>
> >> other places, this section could benefit from improvement before it
>
> >> goes to the SecDir review.  The second sentence in the first
>
> >> paragraph
>
> >> says the
>
> >> following:
>
> >>
>
> >>    Among these issues are
>
> >>    protecting the user's private and symmetric keys, preventing
>
> >> various
>
> >>    attacks, and helping the user avoid mistakes such as inadvertently
>
> >>    encrypting a message for the wrong recipient.
>
> >>
>
> >
>
> >> It would be helpful if you could expand the text and make it more
>
> >> descriptive and applicable to this document.  For example, shouldn’t
>
> >> the first section say user’s private asymmetric and symmetric keys?
>
> >> I
>
> >> assume that is what was intended with private, but it reads funny to
>
> >> me without that.  The only ‘attack’ or caution mentioned in the
>
> >> document is for the application to prevent a user from selecting the
>
> >> wrong key.  Please include some attacks that developers and
>
> >> implementers should be aware and cautioned on, or state that specific
>
> >> attacks and considers are detailed in the subsections to follow.
>
> >>
>
> >> Mike> OK, I can work on expanding that.  There are some other attacks
>
> >> mentioned in the other drafts, such as timing attacks, which can
>
> >> probably at least be mentioned here.  I’ll send draft text to the
>
> >> list
>
> >> and consult with you before doing anything to the actual drafts.
>
> >> Specific suggestions from working group participants would also be
>
> >> highly appreciated.
>
>
>
> The Security Considerations section requires updating, let me know when
> this has been done.  Thanks!
>
>
>
> Mike> The current introduction to all the JOSE security considerations
> sections says:
>
>
>
>    All of the security issues faced by any cryptographic application
>
>    must be faced by a JWS/JWE/JWK agent.  Among these issues are
>
>    protecting the user's private and symmetric keys, preventing various
>
>    attacks, and helping the user avoid mistakes such as inadvertently
>
>    encrypting a message for the wrong recipient.  The entire list of
>
>    security considerations is beyond the scope of this document, but
>
>    some significant considerations are listed here.
>
>
>
> (And the JWT Security Considerations introduction is the same, other than
> also speaking about JWTs.)
>
>
>
> Now that the -27 drafts contain beefed-up text describing specific
> security considerations apropos to each draft, I believe that the best way
> to address the other part of your two-fold comment is simply to delete the
> second sentence (beginning “Among these issues”).  I agree with you that
> it doesn’t add any value at this point.
>
>
>
> Do you agree with that proposed resolution, Kathleen?
>

I can go either way, but think adding in the word asymmetric would be good.
 It reads a little funny without it and I know it should be obvious that it
is intended, but... we have a broad set of folks who read drafts.

I read through the updated version in JWA and am wondering why the
considerations for [JWE
<http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-27#ref-JWE>],
[JWK
<http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-27#ref-JWK>],
[JWS
<http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms-27#ref-JWS>],
are included here?  Isn't it that the other documents rely on JWA and not
the reverse?

We are getting close :-)

Thanks,
Kathleen

>
>
> Best regards,
>
> Kathleen
>
>
>
>                                                             Have a good
> weekend!
>
>                                                             -- Mike
>
>
>



-- 

Best regards,
Kathleen
_______________________________________________
jose mailing list
jose@ietf.org
https://www.ietf.org/mailman/listinfo/jose

Reply via email to