Correct - good catch.  I'll update the draft.  The intent was for there to be 
no pad character in that case.

                                                                           -- 
Mike

From: John Bradley [mailto:ve7...@ve7jtb.com]
Sent: Monday, March 28, 2011 3:00 PM
To: Mike Jones
Cc: oauth@ietf.org; w...@ietf.org; openid-specs...@lists.openid.net; 
openid-sp...@lists.openid.net
Subject: Re: [Openid-specs-ab] [OAUTH-WG] JSON Web Token (JWT) and JSON Web 
Signature (JWS) now in separate specs

Mike in JWT 6.7 if the alg is none.


Otherwise, if the "alg" value

       is ""none"", the JWT Claim Segment is the empty string.
I may be missing something.  If the Alg is none then the Claim segment is still 
the claim segment.   It is the Crypto segment that would just be padding to 
maintain the format.

In 8 10 the decoding has it correct.

So in the event the signature alg is none do we make the cripto segment a pad 
character?

So normally it would be
xxxxxxx.xxxxxxxx.xxxxx

Dropping the cripto segment looks like
xxxxxxx.xxxxxxxx.

Or with a pad char to be ignored
xxxxxxx.xxxxxxxxx.0

Or something like that.

John B.
On 2011-03-28, at 5:28 AM, Mike Jones wrote:


These are now published as IETF drafts.  The IETF .txt version links are:
               http://www.ietf.org/id/draft-jones-json-web-token-03.txt
               http://www.ietf.org/id/draft-jones-json-web-signature-01.txt

                                                            -- Mike

From: oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org> 
[mailto:oauth-boun...@ietf.org] On Behalf Of Mike Jones
Sent: Friday, March 25, 2011 10:26 PM
To: oauth@ietf.org<mailto:oauth@ietf.org>; w...@ietf.org<mailto:w...@ietf.org>; 
openid-specs...@lists.openid.net<mailto:openid-specs...@lists.openid.net>
Cc: openid-sp...@lists.openid.net<mailto:openid-sp...@lists.openid.net>
Subject: [OAUTH-WG] JSON Web Token (JWT) and JSON Web Signature (JWS) now in 
separate specs

As promised, I have split the contents of the JWT spec 
draft-jones-json-web-token-01<http://self-issued.info/docs/draft-jones-json-web-token-01.html>
 into two simpler specs:
                
draft-jones-json-web-token-02<http://self-issued.info/docs/draft-jones-json-web-token-02.html>
                
draft-jones-json-web-signature-00<http://self-issued.info/docs/draft-jones-json-web-signature-00.html>
These should have introduced no semantic changes from the previous spec.

I then applied the feedback that I received since JWT -01 and created revised 
versions of the split specs:
                
draft-jones-json-web-token-03<http://self-issued.info/docs/draft-jones-json-web-token-03.html>
                
draft-jones-json-web-signature-01<http://self-issued.info/docs/draft-jones-json-web-signature-01.html>
The only breaking change introduced was that x5t (X.509 Certificate Thumbprint) 
is now a SHA-1 hash of the DER-encoded certificate, rather than a SHA-256 has, 
as SHA-1 is the prevailing existing practice for certificate thumbprint 
calculations.  See the Document History sections for details on each change 
made.

.txt and .xml versions are also available.  I plan to publish these as IETF 
drafts once the submission window re-opens on Monday.  Feedback welcome!

                                                            -- Mike

P.S.  Yes, work on the companion encryption spec is now under way...

_______________________________________________
Openid-specs-ab mailing list
openid-specs...@lists.openid.net<mailto:openid-specs...@lists.openid.net>
http://lists.openid.net/mailman/listinfo/openid-specs-ab

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to