On 2014-12-18 00:03, Richard Barnes wrote:
On Tue, Dec 9, 2014 at 7:01 PM, Breno de Medeiros <[email protected]
<mailto:[email protected]>> wrote:
On Tue, Dec 9, 2014 at 4:00 PM, Richard Barnes <[email protected]
<mailto:[email protected]>> wrote:
Because if you don't, then WebCrypto will come along and add things like
"A128CBC" and "A128CTR".
That's hardly a good argument to add support to insecure use cases.
I'm not arguing for it, I'm just saying that it's already happened. So JOSE's
principled stand amounted to nothing.
+1
Authenticated encryption can be supported through other means on the wire like
a MAC over
the encrypted container.
The opportunity defining a more complete set of on-the-wise algorithms is BTW
not gone :-)
It is OK to continue saying that only a subset are endorsed for use with JWE.
Anders
--Richard
https://dvcs.w3.org/hg/webcrypto-api/raw-file/tip/spec/Overview.html#jwk-mapping-alg
On Tue, Dec 9, 2014 at 6:28 PM, Breno de Medeiros <[email protected]
<mailto:[email protected]>> wrote:
On Tue, Dec 9, 2014 at 3:19 PM, Jim Schaad <[email protected]
<mailto:[email protected]>> wrote:
We can also blame JOSE for deciding that only authenticated
encryption algorithms should be used.
Apart from supporting legacy use cases there's no reason to support
non-authenticated encryption. But given that JOSE is a new technology, why
should it support legacy use cases?
From: jose [mailto:[email protected]
<mailto:[email protected]>] On Behalf Of Richard Barnes
Sent: Tuesday, December 09, 2014 2:45 PM
To: Anders Rundgren
Cc: [email protected] <mailto:[email protected]>
Subject: Re: [jose] WebCrypto/JOSE Algorithm IDs = Mess
Blame JOSE for using aggregated identifiers. Blame WebCrypto
for using deaggregated identifiers.
Or just accept that the two camps refused to align, and make
yourself a translation table.
http://dxr.mozilla.org/mozilla-central/source/dom/crypto/KeyAlgorithmProxy.cpp#123
On Tue, Dec 9, 2014 at 5:36 AM, Anders Rundgren
<[email protected] <mailto:[email protected]>> wrote:
This is just a complaint from a user.
It is sad that the algorithm IDs never were aligned.
A few examples of what I stumbled into:
1. AES-CBC doesn't exist in JOSE
2. WebCrypto: {name: 'RSA-OAEP', hash: {name: 'SHA-256'}} =
JOSE: RSA-OAEP-256
3. Let's say that you wanted to create a protocol that would
hash something and then you would supply an algorithm ID,
then what would use? AFAICT, there's nothing that would be aligned with
JOSE (it doesn't need hash). Using "SHA-256"?
Well, then you would be mixing algorithm IDs from different
dictionaries which sounds like a rather ugly hack.
That x5c elements are (unlike everything else binary) not
base64url-encoded also feels a bit strange but I guess this a legacy thing.
Anders
_______________________________________________
jose mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/jose
_______________________________________________
jose mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/jose
--
--Breno
--
--Breno
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose