On Wed, Jul 21, 2010 at 8:27 PM, Ben Laurie <b...@google.com> wrote:
> On 16 July 2010 01:43, Dirk Balfanz <balf...@google.com> wrote:
>> Hi guys,
>> after reading through the feedback, we did a pass over the OAuth signature
>> proposals.
>> As a reminder, there are three documents:
>> - a document (called "JSON Tokens") that just explains how to sign something
>> and verify the signature:
>> http://docs.google.com/document/pub?id=1kv6Oz_HRnWa0DaJx_SQ5Qlk_yqs_7zNAm75-FmKwNo4
>>
>> - an extension of JSON Tokens that can be used for signed OAuth tokens:
>> http://docs.google.com/document/pub?id=1JUn3Twd9nXwFDgi-fTKl-unDG_ndyowTZW8OWX9HOUU
>> - a different extension of JSON Tokens that can be used whenever the spec
>> calls for an "assertion":
>> http://docs.google.com/document/pub?id=1s4kjRS9P0frG0ulhgP3He01ONlxeTwkFQV_pCoOowzc
>> (When used in the assertion flow, this last token can also be used to do
>> "2-legged" OAuth)
>>
>> A summary of the (scant) changes:
>> - we spelled out what we mean by RSA-SHA256. Ben Laurie - can you
>> double-check that that sounds good?
>
> Nearly missed this, somehow. Yes, looks good to me. A reference would
> be nice (RFC 3447, for example).

Magic Signatures is using EMSA-PKCS1-v1_5 instead of PSS because it has
wider library supports, I believe. For example, OpenSSL library
interface in PHP
does not seem to support PSS.

>
>> - we decided on unpadded websafe-base64 throughout.
>> - some changes to parameter names.
>> - some small changes I might be forgetting now...
>> As explained in my message to the previous thread, there is still no
>> envelope in there to help with encrypted tokens (b/c we don't understand
>> well enough what the envelopes for encrypted tokens would look like).

Perhaps http://tools.ietf.org/html/draft-sakimura-jsonenc-00 help?

>> One question: What's the deal with having the signature go first? If you can
>> explain to me why that is a good idea, I'm happy to oblige.

With Sign + Encrypt, you are signing the (almost) plain text, while
with Encrypt + Sign, you are sining the cypher text so you would have to
have full trust on the Encrypt process that it did not tamper the
original text.
Also, with Sign + Encrypt, you can store the decrypted text and still
verify the
integrity of the data at a later date, but with Encrypt + Sign, you cannot.
Thus, to me, Sign + Encrypt seem to be a better approach.



-- 
Nat Sakimura (=nat)
http://www.sakimura.org/en/
http://twitter.com/_nat_en
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to