Thanks for your review, Prateek.  Updates resulting from these comments are 
included in the latest drafts.

                                                            Thanks again,
                                                            -- Mike

From: Mike Jones
Sent: Monday, December 10, 2012 5:51 PM
To: 'prateek mishra'; oauth@ietf.org<mailto:oauth@ietf.org>
Subject: RE: [OAUTH-WG] Please review draft-ietf-oauth-json-web-token

Thanks for the comments, Prateek.  Replies inline in green...

                                                                -- Mike

From: oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org> 
[mailto:oauth-boun...@ietf.org] On Behalf Of prateek mishra
Sent: Wednesday, November 07, 2012 7:16 AM
To: oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Please review draft-ietf-oauth-json-web-token

Hannes - here a couple of comments on the 05 draft -

(i) Section 4 -

[quote]
Note however, that the set of claims that a JWT must contain to be
considered valid is context-dependent and is outside the scope of this 
specification. When
used in a security-related context, implementations MUST understand and support 
all of the
claims present; otherwise, the JWT MUST be rejected for processing.
[\quote]

I am not sure what is being stated here. I understand the general sense of the 
paragraph but I found the
two sentences to be contradictory. The second sentence is also very strong - 
suppose we find
some private claim in a JWT that the recipient is unable to understand - 
perhaps an optional
attribute-value pair - MUST it then reject the token?
The strong language about "MUST understand" mirrors the same language in the 
JOSE specs.  As you probably know, there's an open issue being discussed by the 
JOSE working group about whether all header fields must be understood, or 
whether there will be a mechanism for signaling that some header fields may be 
safely ignored if not understood.  I suspect that if a change is made to the 
JOSE specs in this regard, a similar change might be applied here as well.

(ii) Section 6 -

[quote]

A plaintext

   JWT is a JWS using the "none" JWS "alg" header parameter value

   defined in JSON Web Algorithms (JWA) 
[JWA<http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-05#ref-JWA>]; 
it is a JWS with an empty

   JWS Signature value.

[\quote]

It is later clarified that by "empty JWS Signature value" the draft means 
"empty string". That could
be added as a parenthetical remark at the end of the sentence. I actually spent 
some time looking
up the term "empty JWS Signature value" in the JWS specification.
I'll plan to apply this clarification in the next spec release.

Thanks,
prateek

Hi all,



you may have noticed that the JOSE working group had made good progress with 
their work and they are getting closer to a WGLC. This is a good point in time 
for us to review the JWT spec (see 
http://datatracker.ietf.org/doc/draft-ietf-oauth-json-web-token/). Please read 
through it in preparation for the meeting.



It would be good to hear who has implemented it and whether there is feedback 
on the document. Given the OpenID Connect interoperability tests there seem to 
be lots of implementations.



We would like to start a WGLC as soon as the WGLC for the JOSE documents  
starts.



Ciao

Hannes



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to