Anytime Wednesday afternoon. Bret Sent from my Commodore 128D
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 > On Mar 26, 2019, at 4:09 PM, Anders Rundgren <[email protected]> > wrote: > >> On 2019-03-26 08:12, Bret Jordan wrote: >> I would love to have a side meeting here in Prague. > > Bret and Torsten, > any suggestions for a suitable time? > > Anders > >> I can not stress enough how important this JCS work is. Anders talks about >> the banking industry using this. But In addition to the banking sector, the >> entire international cyber threat intelligence community will be using JCS, >> which includes hundreds of major and small vendors, nearly every industry >> vertical, and many governments around the globe. >> Like so many things, we should quit trying to censor technology because a >> few people do not like it, or because we wish the industry would go in a >> different path. Anders has done amazing and brilliant work here. Is it >> going to cover ever corner case? Probably not. But honestly it does not >> need to. It just needs to solve the problems people need, and it does. >> How can we get this group to reconsider it? >> Bret >> Sent from my Commodore 128D >> PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 >>> On Mar 26, 2019, at 7:16 AM, Anders Rundgren <[email protected] >>> <mailto:[email protected]>> wrote: >>>> On 2019-03-25 15:31, Torsten Lodderstedt wrote: >>>> Will there be a side meeting on Wednesday? >>> >>> I can try to arrange that. >>> >>> I'm still curious to hear what for example FAPI suggest for the future. >>> https://openid.net/specs/openid-financial-api-part-2.html#request ? >>> Convincing all open banking system developers out there to dress their >>> precious business messages in base64 as an alternative to their current >>> clear text solutions including the-not-as-bad-as-claimed >>> https://tools.ietf.org/html/draft-cavage-http-signatures-10 may turn out >>> bad. >>> >>> JSON canonicalization as described in the current 05 draft is based on a >>> concluded (and technically pretty successful) research effort verified by >>> multiple implementations including one made externally [1]. There is a >>> single fully documented issue [2] which do requires some considerations by >>> clients to work. >>> >>> Number serialization have been addressed by true specialists in this field >>> (=not me). Recently I verified my original algorithm (copied from V8) with >>> 5 billion random values against a new algorithm developed by Google which >>> Microsoft intends to use in a coming updates to their C# tool chain. >>> >>> No such information was available during the operational time of the JOSE >>> WG which is a rather important thing to keep in mind. >>> >>> A bunch of people at the IETF meeting privately propose that new >>> developments should drop JSON/JWS and rather go for CBOR/COSE. That's >>> actually quite logical since with Base64-encoded messages, you anyway need >>> a decoder to make messages human readable. Personally I'm doing the >>> opposite namely applying canonicalization to the JWS itself [3] >>> >>> Anders >>> >>> 1] https://github.com/dryruby/json-canonicalization >>> >>> 2] >>> https://tools.ietf.org/html/draft-rundgren-json-canonicalization-scheme-05#appendix-E >>> >>> 3] User payment authorization in "Saturn". Similar to XML DSig but at 10% >>> of the complexity: >>> { >>> "requestHash": { >>> "alg": "S256", >>> "val": "cA-QNdJHcynjuM44ty-zXgXwx100AZVRFLmYx1So0Xc" >>> }, >>> "domainName": "demomerchant.com <http://demomerchant.com>", >>> "paymentMethod": "https://bankdirect.net", >>> "accountId": "8645-7800239403", >>> "timeStamp": "2019-03-23T10:33:02+01:00", >>> "signature": { >>> "alg": "ES256", >>> "jwk": { >>> "kty": "EC", >>> "crv": "P-256", >>> "x": "rQ4WXMB6_wQKHSiY_mbJ4QkGpfWLssF7hvIiiFpDEx8", >>> "y": "Fh2rl0LGTtvaomOuhuRNo9Drz9o0--WXV2ITvdVQFRY" >>> }, >>> "val": >>> "j2LL9pr2RyrPxvFlj8IzMhno5vvgGIgf2xi23dA5u_XwjYlIvT9qwIVKaCKYwjb26J5mMUL5zV02lqQGjZRClw" >>> } >>> } >>> >>> >>>>> Am 13.03.2019 um 06:36 schrieb Bret Jordan <[email protected] >>>>> <mailto:[email protected]> <mailto:[email protected]>>: >>>>> We should for sure setup a side meeting on Wednesday to talk about JCS.. >>>>> That would be good. We could also talk a bit after the HotRFC session. >>>>> >>>>> >>>>> Thanks, >>>>> Bret >>>>> PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 >>>>> "Without cryptography vihv vivc ce xhrnrw, however, the only thing that >>>>> can not be unscrambled is an egg." >>>>> >>>>>> On Mar 12, 2019, at 11:03 PM, Anders Rundgren >>>>>> <[email protected] <mailto:[email protected]> >>>>>> <mailto:[email protected]>> wrote: >>>>>> >>>>>> On 2019-03-13 04:46, Anthony Nadalin wrote: >>>>>>> I'm not sure why you say that FAPI is rolling it's own as we are not, >>>>>>> please explain >>>>>> >>>>>> I was referring to this part of FAPI/OpenID: >>>>>> https://openid.net/specs/openid-financial-api-part-2.html#introduction-3 >>>>>> >>>>>> Is that a proposed standard? It claims to be RESTFul but does not deal >>>>>> with HTTP Method and URI which are fundamental parts of REST. >>>>>> >>>>>> In addition, one of the major interested parties behind FAPI, Open >>>>>> Banking in the UK, have selected another method >>>>>> (https://tools.ietf.org/html/draft-rundgren-signed-http-requests-00#appendix-B.3), >>>>>> while other players in this field including French banks and the Berlin >>>>>> group are betting on: >>>>>> https://tools.ietf.org/html/draft-cavage-http-signatures-10 >>>>>> >>>>>> This is the motivation behind this work. If you are in Prague, maybe we >>>>>> can talk about this? >>>>>> >>>>>> regards, >>>>>> Anders >>>>>> >>>>>> >>>>>>> -----Original Message----- >>>>>>> From: jose <[email protected] <mailto:[email protected]> >>>>>>> <mailto:[email protected]>> On Behalf Of Anders Rundgren >>>>>>> Sent: Monday, March 11, 2019 8:57 AM >>>>>>> To: [email protected] <mailto:[email protected]> <mailto:[email protected]> >>>>>>> Subject: [jose] Signed HTTP Requests @ IETF-104 >>>>>>> I will be there Saturday evening - Thursday 13.00 in case you are >>>>>>> interested in this topic. >>>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-rundgren-signed-http-requests-00&data=02%7C01%7Ctonynad%40microsoft.com%7Ccdd16fdc2e264a6868ac08d6a63a4098%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C636879166457446453&sdata=gXhXwQOm0vwPvXbQUQj%2FwD3%2FrsDU%2BB95SF6CjfR80CA%3D&reserved=0 >>>>>>> 4 minute "lightning" talk: >>>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcyberphone.github.io%2Fietf-signed-http-requests%2Fhotrfc-shreq.pdf&data=02%7C01%7Ctonynad%40microsoft.com%7Ccdd16fdc2e264a6868ac08d6a63a4098%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C636879166457446453&sdata=Al4bQN9BkM8ESKwqIZD6q1ZeQhYc5PrlXDR7vuRy6JQ%3D&reserved=0 >>>>>>> On-line "laboratory": >>>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmobilepki.org%2Fshreq%2Fhome&data=02%7C01%7Ctonynad%40microsoft.com%7Ccdd16fdc2e264a6868ac08d6a63a4098%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C636879166457446453&sdata=bLjKK%2FcGsB54%2B%2FVbbQQDrrgxdCooQp0%2BfJDBBsRIg8M%3D&reserved=0 >>>>>>> thanx, >>>>>>> Anders >>>>>>> _______________________________________________ >>>>>>> jose mailing list >>>>>>> [email protected] <mailto:[email protected]> <mailto:[email protected]> >>>>>>> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fjose&data=02%7C01%7Ctonynad%40microsoft.com%7Ccdd16fdc2e264a6868ac08d6a63a4098%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C636879166457446453&sdata=Ah7rSZOWkkeTs%2Byi76vkqK1O5iN%2FckkCRoGvtsUDWYc%3D&reserved=0 >>>>>> >>>>>> _______________________________________________ >>>>>> jose mailing list >>>>>> [email protected] <mailto:[email protected]> <mailto:[email protected]> >>>>>> https://www.ietf.org/mailman/listinfo/jose >>>>> >>>>> _______________________________________________ >>>>> jose mailing list >>>>> [email protected] <mailto:[email protected]> <mailto:[email protected]> >>>>> https://www.ietf.org/mailman/listinfo/jose >>> >
_______________________________________________ jose mailing list [email protected] https://www.ietf.org/mailman/listinfo/jose
