Mike,

It is my understanding there will be new draft (or a revision of the MAC draft) 
that builds on the JWT draft to define a secure (MAC) token based on the  
security requirements presentation I gave today. 

I believe all/most of your questions should be addressed in the security draft: 
http://tools.ietf.org/html/draft-tschofenig-oauth-security-01. 

Phil

@independentid
www.independentid.com
phil.h...@oracle.com





On 2013-03-14, at 11:05 PM, Peck, Michael A wrote:

> To explain my comment at the microphone today:
>  
> Section 8 states:
>  
> JWTs use JSON Web Signature (JWS) [JWS] and JSON Web Encryption (JWE)
> [JWE] to sign and/or encrypt the contents of the JWT.
>  
> I believe it’d be useful to expand upon this to give guidance to those using 
> JWT on what they should do to cryptographically protect it.  When should they 
> do nothing? When should they just sign? When should they just encrypt? When 
> should they sign and then encrypt? What security properties does each option 
> provide or not provide?
>  
> The choices seem to be:
>  
> 1.       No JWS and no JWE – assumes the JWT is protected through some other 
> mechanism or that it doesn’t need to be protected
>  
> 2.       JWS – probably OK if confidentiality is not necessary. 
>  
> 3.       JWE:
> Authentication is not provided unless a shared symmetric key is used (if it’s 
> asymmetric encryption, only integrity protection will be provided, not 
> authentication). 
> Under what conditions is authentication necessary or not necessary?
> AES-GCM may not be safe to use with a shared symmetric key (I sent feedback 
> on this to the jose mailing list).
>  
> draft-ietf-oauth-v2-http-mac for example seems to currently solely use JWE 
> and says “this keying material is a symmetric or asymmetric long-term key 
> established between the resoruce server and authorization server”.  If it’s 
> asymmetric, a JWS seems to also be necessary to authenticate the 
> authorization server as the source of the JWT?
>  
> 4.       JWS then JWE:
> A recipient who is an attacker/who is compromised could potentially strip off 
> the JWE (making it just a JWS) or strip the JWE and replace it with another 
> JWE to cause confusion about the intended recipient of the JWT and forward it 
> on to another recipient.  The presence of the “aud” (Audience) claim seems to 
> protect against this.  However, the “aud” claim is optional in JWTs.
>  
>  
> Thanks,
> Mike
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to