Sorry - the note below was sent to the wrong thread. Please disregard.
________________________________
From: Mike Jones<mailto:[email protected]>
Sent: ‎2/‎2/‎2015 1:22 PM
To: Stephen Farrell<mailto:[email protected]>; Richard 
Barnes<mailto:[email protected]>
Cc: Jim Schaad<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; ⌘ Matt Miller<mailto:[email protected]>
Subject: Re: [jose] Working Group last call on draft-ietf-jose-jwk-thumbprint

Internal Microsoft IoT people (in different groups from mine) are sending me 
requests like this...

                                -- Mike

The JWT’s signature rules are particular about JSON in UTF-8 and base64 
encoding is required and as the IoT customers we run into are extremely 
concerned about data transfer volume, every byte we can save there counts and 
signature values do add up quickly. Encodings like the ones I listed above 
encode arrays of octets as such.

For illustration of the bandwidth greed: there are network operators like 
Sigfox that sell data plans with an allowance of 140 messages per device and 
per day with 12 bytes (!) per message in payload. I’m not suggesting that we do 
anything with JWTs in that particular case, but this marks the lower end of a 
spectrum of which LTE marks the ultra-expensive top when you look at commercial 
M2M data contracts. Payloads of 100+ bytes are big for many solutions.

The majority of the work in the current JOSE drafts appears to be reusable for 
the other encoding types of the “JSON structural family” like the ones I 
enumerated above, except for the actual signature construction and the 
text-biased token encoding using base64.

The context in which I’m looking at JWT/JWS is for message-level payload 
signatures for the purposes of origin attestation and authorization, whereby 
the signing keys are derived keys scoped to the particular operation/message. A 
signed payload message might look suspiciously like a JWT.


-----Original Message-----
From: jose [mailto:[email protected]] On Behalf Of Stephen Farrell
Sent: Friday, January 23, 2015 10:04 AM
To: Richard Barnes
Cc: Jim Schaad; [email protected]; ⌘ Matt Miller
Subject: Re: [jose] Working Group last call on draft-ietf-jose-jwk-thumbprint



On 23/01/15 17:57, Richard Barnes wrote:
>> >
>> > I think it's at least arguable that that'd be worth the code to
>> > produce a hashed SPKI and better than either aiming for the
>> > simplest possible code, or for the current hash input from the
>> > draft.
>> >
> Dude, seriously.  The whole point of this WG is to not do ASN.1.

Yeah well, it's just a different fixed template so it's not "doing" ASN.1 at 
all really, or only about as much as PKCS#1 requires, which is almost nothing. 
And SPKI formatted export of public keys is supported directly in lots of 
crypto libraries, incl. WebCrypto so it's probably even less lines of code if 
the key was already imported/generated. And it is the same as some other 
protocols use, providing interop, which is also the whole point of this and 
other WGs I'd guess (...dude:-)

S.

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to