Good to know.   So the AS needs to expose a public key for the TPM to use for 
encryption.   I am guessing you are not using a encrypted JWK for that.  What 
is the format the TPM produces the wrapped key in?

John B.
> On Nov 5, 2015, at 1:55 PM, Anthony Nadalin <tony...@microsoft.com> wrote:
> 
> I can say on all windows based devices (pc, xbox, phone, etc) with only TPM 
> 1.1 this will be the approach so it will be commonly used 
> 
> -----Original Message-----
> From: John Bradley [mailto:ve7...@ve7jtb.com] 
> Sent: Wednesday, November 4, 2015 8:52 PM
> To: Anthony Nadalin <tony...@microsoft.com>
> Cc: Justin Richer <jric...@mit.edu>; <oauth@ietf.org> <oauth@ietf.org>
> Subject: Re: [OAUTH-WG] Proof-of-Possession Key Semantics for JWTs spec 
> addressing final shepherd comment
> 
> OK, no good reason unless the client is using a HSM that can do HMAC and can 
> export a symmetric key wrapped in a asymmetric key provided by the AS.
> 
> We don’t currently cover that use case of sending a wrapped symmetric key to 
> the AS in POP key distribution.   
> I don’t know how common that is going to be, but it is worth thinking about 
> defining.
> 
> John B.
> 
>> On Nov 5, 2015, at 1:45 PM, Anthony Nadalin <tony...@microsoft.com> wrote:
>> 
>> Not sure why you think its weaker as it would be a wrapped key that 
>> the hardware produces
>> 
>> -----Original Message-----
>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of John Bradley
>> Sent: Wednesday, November 4, 2015 8:43 PM
>> To: Justin Richer <jric...@mit.edu>
>> Cc: <oauth@ietf.org> <oauth@ietf.org>
>> Subject: Re: [OAUTH-WG] Proof-of-Possession Key Semantics for JWTs 
>> spec addressing final shepherd comment
>> 
>> In the asymmetric case the use of a HSM or secure element is the argument 
>> for the client selecting the public key.   In those cases the client is 
>> doing the key gen in hardware so one hopes it is OK.   In the symetric case 
>> the client generating the key is weaker (as in I can’t think of any really 
>> good reason).
>> 
>> 
>>> On Nov 5, 2015, at 1:35 PM, Justin Richer <jric...@mit.edu> wrote:
>>> 
>>> I’d argue that it’s best practice, and in line with other parts of OAuth, 
>>> if we assume the server generates it in the normal case (issuer -> 
>>> presenter). Client generated token keys should be an exception, especially 
>>> in the asymmetric case.
>>> 
>>> — Justin
>>> 
>>>> On Nov 5, 2015, at 1:32 PM, John Bradley <ve7...@ve7jtb.com> wrote:
>>>> 
>>>> Agreed the only real difference is the quality of the key.  If the server 
>>>> generates it, then it knows that the client is not using the fixed hex 
>>>> value of DEADBEEF for everything.
>>>> 
>>>> John B.
>>>>> On Nov 5, 2015, at 9:25 AM, Hannes Tschofenig <hannes.tschofe...@gmx.net> 
>>>>> wrote:
>>>>> 
>>>>> I agree that the effect is the same. From a security point of view 
>>>>> there is only an impact if one of the two parties is in a better 
>>>>> position to generate random numbers, which is the basis for 
>>>>> generating a high entropy symmetric key.
>>>>> 
>>>>> On 11/04/2015 11:51 PM, Mike Jones wrote:
>>>>>> Thanks for the detailed read, Brian.  You’re right that in the 
>>>>>> symmetric case, either the issuer or the presenter can create the 
>>>>>> symmetric PoP key and share it with the other party, since the effect is 
>>>>>> equivalent.
>>>>>> I suspect that both the key distribution draft and this draft 
>>>>>> should be updated with a sentence or two saying that either 
>>>>>> approach can be taken.  Do others concur?
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>                                                        -- Mike
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> *From:*Brian Campbell [mailto:bcampb...@pingidentity.com]
>>>>>> *Sent:* Thursday, November 05, 2015 7:48 AM
>>>>>> *To:* Mike Jones
>>>>>> *Cc:* Kepeng Li; oauth@ietf.org
>>>>>> *Subject:* Re: [OAUTH-WG] Proof-of-Possession Key Semantics for 
>>>>>> JWTs spec addressing final shepherd comment
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> +1 for the diagrams making the document more understandable.
>>>>>> 
>>>>>> One little nit/question, step 1 in both Symmetric and Asymmetric 
>>>>>> keys shows the Presenter sending the key to the Issuer. It's 
>>>>>> possible, however, for the key to be sent the other way. Presenter 
>>>>>> sending it to the Issuer is probably preferred for asymmetric, 
>>>>>> especially if the client can secure the private keys in hardware.
>>>>>> But I don't know if one way or the other is clearly better for 
>>>>>> symmetric case and PoP key distribution currently has it the other 
>>>>>> way 
>>>>>> <https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2ftools.ietf.org%2fhtml%2fdraft-ietf-oauth-pop-key-distribution-02%23section-4.2&data=01%7c01%7ctonynad%40microsoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=UgZEoqQiaUk9VdYpSQRvUeVVOQgIUg3UmAr18oQ7GtI%3d>.
>>>>>> Should the intro text somehow mention the possibility that the 
>>>>>> Issuer could create the key and send it to the Presenter?
>>>>>> 
>>>>>> I know it's only the introduction but it was just something that 
>>>>>> jumped out at me.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> On Wed, Nov 4, 2015 at 9:04 AM, Mike Jones 
>>>>>> <michael.jo...@microsoft.com <mailto:michael.jo...@microsoft.com>> wrote:
>>>>>> 
>>>>>> Thanks for suggesting the diagrams, Kepeng. They make the document 
>>>>>> more understandable.
>>>>>> 
>>>>>> -- Mike
>>>>>> 
>>>>>> ------------------------------------------------------------------
>>>>>> -
>>>>>> -----
>>>>>> 
>>>>>> *From: *Kepeng Li <mailto:kepeng....@alibaba-inc.com>
>>>>>> *Sent: *‎11/‎5/‎2015 12:57 AM
>>>>>> *To: *Mike Jones <mailto:michael.jo...@microsoft.com>;
>>>>>> oauth@ietf.org <mailto:oauth@ietf.org>
>>>>>> *Subject: *Re: Proof-of-Possession Key Semantics for JWTs spec 
>>>>>> addressing final shepherd comment
>>>>>> 
>>>>>> Thank you Mike.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> The diagrams look good to me.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> Kind Regards
>>>>>> 
>>>>>> Kepeng
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> *发件人**: *Mike Jones <michael.jo...@microsoft.com 
>>>>>> <mailto:michael.jo...@microsoft.com>>
>>>>>> *日期**: *Thursday, 5 November, 2015 12:32 am
>>>>>> *至**: *"oauth@ietf.org <mailto:oauth@ietf.org>" <oauth@ietf.org 
>>>>>> <mailto:oauth@ietf.org>>
>>>>>> *抄送**: *Li Kepeng <kepeng....@alibaba-inc.com 
>>>>>> <mailto:kepeng....@alibaba-inc.com>>
>>>>>> *主题**: *Proof-of-Possession Key Semantics for JWTs spec addressing 
>>>>>> final shepherd comment
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> Proof-of-Possession Key Semantics for JWTs draft -06 addresses the 
>>>>>> remaining document shepherd comment – adding use case diagrams to 
>>>>>> the introduction.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> The updated specification is available at:
>>>>>> 
>>>>>> ·        
>>>>>> https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2ftools.ietf.org%2fhtml%2fdraft-ietf-oauth-proof-of-possession-06&data=01%7c01%7ctonynad%40microsoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=6hE6dOO0I1%2ffF005rVknyOFHuB18gdpZg9dftExLtCw%3d
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> An HTML formatted version is also available at:
>>>>>> 
>>>>>> ·       
>>>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fs
>>>>>> e 
>>>>>> lf-issued.info%2fdocs%2fdraft-ietf-oauth-proof-of-possession-06.ht
>>>>>> m
>>>>>> l&data=01%7c01%7ctonynad%40microsoft.com%7c9456670075d04a51f85508d
>>>>>> 2 
>>>>>> e59ba294%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=EQd4rUcuyqdS
>>>>>> P gmibtcfjMpJm6RWWwCZC85%2bCboEs54%3d
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>>                                                        -- Mike
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> P.S.  This note was also posted at 
>>>>>> https://na01.safelinks.protection.outlook.com/?url=http%3a%2f%2fself-issued.info%2f%3fp%3d1471&data=01%7c01%7ctonynad%40microsoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=TMfX1tG5qucl%2be2KVpyMBuj72ZQ%2f%2bEKGoTyJyf%2bfJi4%3d
>>>>>>  and as @selfissued 
>>>>>> <https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2ftwitter.com%2fselfissued&data=01%7c01%7ctonynad%40microsoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=LfFAjchzCTh0x%2fY9hr0W%2fSohPGgb0JVjL%2f2Az%2f12BCg%3d>.
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org> 
>>>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fw
>>>>>> w 
>>>>>> w.ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40m
>>>>>> i
>>>>>> crosoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af9
>>>>>> 1 
>>>>>> ab2d7cd011db47%7c1&sdata=ND3ydaXOsPMsoRhE0Uyq0uznGy6MdYOLZQJHLhEQK
>>>>>> J
>>>>>> s%3d
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fw
>>>>>> w 
>>>>>> w.ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40m
>>>>>> i
>>>>>> crosoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af9
>>>>>> 1 
>>>>>> ab2d7cd011db47%7c1&sdata=ND3ydaXOsPMsoRhE0Uyq0uznGy6MdYOLZQJHLhEQK
>>>>>> J
>>>>>> s%3d
>>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fww
>>>>> w 
>>>>> .ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40mic
>>>>> r
>>>>> osoft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab
>>>>> 2 
>>>>> d7cd011db47%7c1&sdata=ND3ydaXOsPMsoRhE0Uyq0uznGy6MdYOLZQJHLhEQKJs%3
>>>>> d
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.
>>>> ietf.org%2fmailman%2flistinfo%2foauth&data=01%7c01%7ctonynad%40micro
>>>> s 
>>>> oft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab2d7
>>>> c d011db47%7c1&sdata=ND3ydaXOsPMsoRhE0Uyq0uznGy6MdYOLZQJHLhEQKJs%3d
>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.i
>> etf.org%2fmailman%2flistinfo%2foauth%0a&data=01%7c01%7ctonynad%40micro
>> soft.com%7c9456670075d04a51f85508d2e59ba294%7c72f988bf86f141af91ab2d7c
>> d011db47%7c1&sdata=BLqSuDjWLY72fGm0UrpLwxQVnamMelggJeOpYJESVFs%3d
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to