Hi Sergey,

Actually, the JWT restriction to only using the compact serialization is 
already in the JWT spec itself.  The last sentence of the first paragraph of 
the introduction at http://tools.ietf.org/html/rfc7519#section-1 says "JWTs are 
always represented using the JWS Compact Serialization or the JWE Compact 
Serialization".  The new text in the JWS Unsigned Payload Option spec just adds 
the restriction that JWTs are to continue to use RFC7515 as written - base64url 
encoding the JWT claims as they always have been - for interop purposes.

That doesn't mean that other applications can't use JWS to sign detached 
unencoded JSON payloads with the "b64":false option using either JWS 
serialization.

Does that address what you were thinking about or do you still have concerns?

                                -- Mike

-----Original Message-----
From: Sergey Beryozkin [mailto:[email protected]] 
Sent: Monday, August 10, 2015 2:39 AM
To: Mike Jones; [email protected]
Subject: Re: [jose] JWS Signing Input Options initial working group draft

Hi, thanks for adding the JWS JSON (flattened serialization) example,

I thought the earlier text was also clear about having to use the detached 
payloads in case of JWS Compact.

Re the new JWT restriction.

I know JWT is meant to be used primarily in OAuth2 contexts as a token or grant 
(or as one of token or grant property) representation and hence it is JWS 
Compact.

But I wonder, should this particular text effectively block the possible future 
use of JWT in (JWS JSON) message payloads...

Cheers, Sergey
On 10/08/15 05:21, Mike Jones wrote:
> You can't use an unencoded non-detached JSON payload using the JWS Compact 
> Serialization because it uses characters that aren't URL-safe, such as "{".  
> For that reason, the spec now makes it clear that JWTs cannot use the 
> "b64":false option.
>
> You *can* use JSON payloads with the JWS JSON Serialization.  Any 
> double-quote characters in the JSON would have to be quoted - typically using 
> \" - so that the double-quotes don't terminate the "payload" value.  See the 
> new section 
> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2ftools.ietf.org%2fhtml%2fdraft-ietf-jose-jws-signing-input-options-01%23section-5&data=01%7c01%7cMichael.Jones%40microsoft.com%7c634a8171fb874a34dbe908d2a1678cfb%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=FdTmmqFjXX9LBw56a1%2bk2K3dPmhp89ZqEec%2bgbAcRZA%3d
>  for more on character restrictions in unencoded payloads.
>
>                               -- Mike
>
> -----Original Message-----
> From: jose [mailto:[email protected]] On Behalf Of Sergey 
> Beryozkin
> Sent: Saturday, July 25, 2015 3:01 AM
> To: [email protected]
> Subject: Re: [jose] JWS Signing Input Options initial working group 
> draft
>
> Hi, can you please add an example showing a b64 header affecting JWS JSON 
> payload ? I can imagine how it will look like but it is good to see an 
> example that can be tested locally...
>
> Cheers, Sergey
> On 23/07/15 19:17, Mike Jones wrote:
>> The initial working group version of JWS Signing Input Options has 
>> been posted.  It contains no normative changes from
>> draft-jones-jose-jws-signing-input-options-00
>> <https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fself-issued.info%2f%3fp%3d1398&data=01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=zQrvoO4fBOa1nUomMVoBT862ELgRpuIQ%2fBaV17ijH7Y%3d>.
>>
>> Let the working group discussions begin!  I particularly call your 
>> attention to Martin Thomson's review at 
>> https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fwww.i
>> e
>> tf.org%2fmail-archive%2fweb%2fjose%2fcurrent%2fmsg05158.html%2c&data=
>> 0 
>> 1%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d7
>> e 
>> 6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=2mVSuUk74d8ZGB9gxWRy
>> b f%2bUz5pxOXmLiUcAqL%2bVvNk%3d Nat Sakimura's review at 
>> https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fwww.ietf.org%2fmail-archive%2fweb%2fjose%2fcurrent%2fmsg05189.html%2c&data=01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=zdSucPmd5z%2b5Q5Zi%2fB61FmoUn9bhxmvatIl3R9WOdhQ%3d
>>  and Matias Woloski's review at 
>> https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fwww.ietf.org%2fmail-archive%2fweb%2fjose%2fcurrent%2fmsg05191.html&data=01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=raojbpPQjvnjNDynLSzSydtnVe%2fnfmWvIRTD9oXoKqA%3d
>>  to start things off.
>>
>> The specification is available at:
>>
>> *https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2ftoo
>> l 
>> s.ietf.org%2fhtml%2fdraft-ietf-jose-jws-signing-input-options-00&data
>> =
>> 01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d
>> 7
>> e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=B7CCBZSw%2f9mJ354xj
>> 1
>> Vplr0CKN3KjSDXHeFuUbWYx%2fs%3d
>>
>> An HTML formatted version is also available at:
>>
>> *https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fself
>> - 
>> issued.info%2fdocs%2fdraft-ietf-jose-jws-signing-input-options-00.htm
>> l
>> &data=01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a424930
>> 8 
>> d294d7e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=H0jHGZqOrtsxM
>> B
>> EY3W7lFx2agz8V54RDoALY%2bxcjWV0%3d
>>
>>                                                               -- Mike
>>
>> P.S.  This note is also posted at
>> https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fself-issued.info%2f%3fp%3d1432&data=01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=Ehd0PdoNA2rZx9b%2bTrPOgO5G2Nxkp1FutbTnL7cD9dg%3d
>>  and as @selfissued 
>> <https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2ftwitter.com%2fselfissued&data=01%7c01%7cmichael.jones%40microsoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=54dOa%2fD75zbVVpfbjYFAq4yL9zmJ7q9p2qIbJRY%2flIA%3d>.
>>
>>
>>
>> _______________________________________________
>> jose mailing list
>> [email protected]
>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.
>> i 
>> etf.org%2fmailman%2flistinfo%2fjose&data=01%7c01%7cmichael.jones%40mi
>> c 
>> rosoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2
>> d
>> 7cd011db47%7c1&sdata=fOZrXA8pnh4Z5XsMQw5ro6Fc0%2bECj%2bKjeEziSJ5V5xM%
>> 3
>> d
>>
>
> _______________________________________________
> jose mailing list
> [email protected]
> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.i
> etf.org%2fmailman%2flistinfo%2fjose&data=01%7c01%7cmichael.jones%40mic
> rosoft.com%7cf40ec174fcc442a4249308d294d7e6e0%7c72f988bf86f141af91ab2d
> 7cd011db47%7c1&sdata=fOZrXA8pnh4Z5XsMQw5ro6Fc0%2bECj%2bKjeEziSJ5V5xM%3
> d
>

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to