On 2014-12-18 00:03, Richard Barnes wrote:
On Tue, Dec 9, 2014 at 7:01 PM, Breno de Medeiros <[email protected] 
<mailto:[email protected]>> wrote:



    On Tue, Dec 9, 2014 at 4:00 PM, Richard Barnes <[email protected] 
<mailto:[email protected]>> wrote:

        Because if you don't, then WebCrypto will come along and add things like 
"A128CBC" and "A128CTR".


    That's hardly a good argument to add support to insecure use cases.


I'm not arguing for it, I'm just saying that it's already happened.  So JOSE's 
principled stand amounted to nothing.

+1

Authenticated encryption can be supported through other means on the wire like 
a MAC over
the encrypted container.

The opportunity defining a more complete set of on-the-wise algorithms is BTW 
not gone :-)
It is OK to continue saying that only a subset are endorsed for use with JWE.

Anders



--Richard


        
https://dvcs.w3.org/hg/webcrypto-api/raw-file/tip/spec/Overview.html#jwk-mapping-alg

        On Tue, Dec 9, 2014 at 6:28 PM, Breno de Medeiros <[email protected] 
<mailto:[email protected]>> wrote:



            On Tue, Dec 9, 2014 at 3:19 PM, Jim Schaad <[email protected] 
<mailto:[email protected]>> wrote:

                We can also blame JOSE for deciding that only authenticated 
encryption algorithms should be used.


            Apart from supporting legacy use cases there's no reason to support 
non-authenticated encryption. But given that JOSE is a new technology, why 
should it support legacy use cases?




                From: jose [mailto:[email protected] 
<mailto:[email protected]>] On Behalf Of Richard Barnes
                Sent: Tuesday, December 09, 2014 2:45 PM
                To: Anders Rundgren
                Cc: [email protected] <mailto:[email protected]>
                Subject: Re: [jose] WebCrypto/JOSE Algorithm IDs = Mess

                Blame JOSE for using aggregated identifiers.  Blame WebCrypto 
for using deaggregated identifiers.
                Or just accept that the two camps refused to align, and make 
yourself a translation table.
                
http://dxr.mozilla.org/mozilla-central/source/dom/crypto/KeyAlgorithmProxy.cpp#123

                On Tue, Dec 9, 2014 at 5:36 AM, Anders Rundgren 
<[email protected] <mailto:[email protected]>> wrote:
                This is just a complaint from a user.
                It is sad that the algorithm IDs never were aligned.

                A few examples of what I stumbled into:

                1. AES-CBC doesn't exist in JOSE

                2. WebCrypto: {name: 'RSA-OAEP', hash: {name: 'SHA-256'}} = 
JOSE: RSA-OAEP-256

                3. Let's say that you wanted to create a protocol that would 
hash something and then you would supply an algorithm ID,
                then what would use?  AFAICT, there's nothing that would be aligned with 
JOSE (it doesn't need hash). Using "SHA-256"?
                Well, then you would be mixing algorithm IDs from different 
dictionaries which sounds like a rather ugly hack.

                That x5c elements are (unlike everything else binary) not 
base64url-encoded also feels a bit strange but I guess this a legacy thing.

                Anders

                _______________________________________________
                jose mailing list
                [email protected] <mailto:[email protected]>
                https://www.ietf.org/mailman/listinfo/jose


                _______________________________________________
                jose mailing list
                [email protected] <mailto:[email protected]>
                https://www.ietf.org/mailman/listinfo/jose




-- --Breno





-- --Breno


_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to