I think the SIV draft is well suited to COSE - it shares many similar 
properties to CCM, which is widely used in embedded/IoT applications (and 
COSE). The misuse resistance is also particularly appealing in those 
environments (indeed, I created the draft to support some IoT activity at 
ForgeRock). For example, Teserakt (https://teserakt.io <https://teserakt.io/>) 
use SIV mode in their IoT platform [1].

The ECDH-1PU draft is also potentially interesting for constrained 
environments, given that it eliminates the need for a separate signature so 
would provide a reduction in code size. COSE already has an ECDH-SS mode which 
is also authenticated, so this would compliment that with some stronger 
security properties.

I think therefore that the COSE WG could be a natural home, so I will send a 
message there to see if there is interest and otherwise take them to 
secdispatch. The drafts can then register identifiers for COSE and JOSE at the 
same time.

[1]: 
https://teserakt-io.github.io/e4-doc/specifications/cryptography-primitives/#authenticated-encryption
 
<https://teserakt-io.github.io/e4-doc/specifications/cryptography-primitives/#authenticated-encryption>
 

— Neil

> On 10 Aug 2020, at 20:39, Matthew A. Miller <linuxwolf+i...@outer-planes.net> 
> wrote:
> 
> Hi all,
> 
> I have not read these drafts yet, so please forgive me if speaking out
> of turn.
> 
> Speaking as co-chair of COSE WG, we're intermittently discussing a
> recharter, and accepting new algorithms without recharter has consensus
> so far.  Note, though, that the COSE WG is focused on COSE and not JOSE.
> Not to say the work couldn't be done there, but if there's little-to-no
> interest in COSE then it is not likely to make progress.
> 
> Also, if there's not a clear place to progress work, I would strongly
> suggest bringing it up on secdispa...@ietf.org <mailto:secdispa...@ietf.org>, 
> whose purpose is to find
> homes for new work.
> 
> 
> - m&m
> 
> Matthew A. Miller
> On 20/08/10 11:38, Vladimir Dzhuvinov wrote:
>> On 10/08/2020 11:28, Neil Madden wrote:
>>> Thanks Vladimir,
>>> 
>>> Responses below
>>> 
>>>> On 8 Aug 2020, at 10:40, Vladimir Dzhuvinov <vladi...@connect2id.com> 
>>>> wrote:
>>>> 
>>>> Hi Neil,
>>>> 
>>>> I definitely like the elegance of the proposed alg for JOSE, it provides
>>>> something that isn't currently available in the various classes of algs
>>>> made standard in JOSE.
>>>> 
>>>> I also wanted to ask what's happening with AES SIV for JOSE, if there's
>>>> traction / feedback / support there as well?
>>>> 
>>>> https://tools.ietf.org/html/draft-madden-jose-siv-mode-02
>>> Thanks for bringing this up. I’ve not received much feedback about this 
>>> one, and I haven’t been very good at pushing it. If there is interest then 
>>> I’d certainly be interested in bringing this forward too. 
>>> 
>>> That draft might be a better fit for eg the COSE WG though, which could 
>>> then also register identifiers for JOSE. What do you think?
>> 
>> If the COSE is the "proper" WG to get the spec completed and the algs
>> registered, then let it be COSE. We can continue the conversation there.
>> I support both drafts.
>> 
>>> 
>>>> Vladimir
>>>> 
>>>> 
>>>>>> On 05/08/2020 13:01, Neil Madden wrote:
>>>>> Hi all,
>>>>> You may remember me from such I-Ds
>>>>> as https://tools.ietf.org/html/draft-madden-jose-ecdh-1pu-03, which
>>>>> proposes adding a new encryption algorithm to JOSE. I’d like to
>>>>> reserve a bit of time to discuss it at one of the upcoming interim
>>>>> meetings.
>>>>> The basic idea is that in many cases in OAuth and OIDC you want to
>>>>> ensure both confidentiality and authenticity of some token - for
>>>>> example when transferring an ID token containing PII to the client
>>>>> through the front channel, or for access tokens intended to be handled
>>>>> by a specific RS without online token introspection (such as the JWT
>>>>> access token draft). If you have a shared secret key between the AS
>>>>> and the client/RS then you can use symmetric authenticated encryption
>>>>> (alg=dir or alg=A128KW etc). But if you need to use public key
>>>>> cryptography then currently you are limited to a nested
>>>>> signed-then-encrypted JOSE structure, which produces much larger token
>>>>> sizes.
>>>>> The draft adds a new “public key authenticated encryption” mode based
>>>>> on ECDH in the NIST standard “one-pass unified” model. The primary
>>>>> advantage for OAuth usage is that the tokens produced are more compact
>>>>> compared to signing+encryption (~30% smaller for typical access/ID
>>>>> token sizes in compact serialization). Performance-wise, it’s roughly
>>>>> equivalent. I know that size concerns are often a limiting factor in
>>>>> choosing whether to encrypt tokens, so this should help.
>>>>> In terms of implementation, it’s essentially just a few extra lines of
>>>>> code compared to an ECDH-ES implementation. (Some JOSE library APIs
>>>>> might need an adjustment to accommodate the extra private key needed
>>>>> for encryption/public key for decryption).
>>>>> I’ve received a few emails off-list from people interested in using it
>>>>> for non-OAuth use-cases such as secure messaging applications. I think
>>>>> these use-cases can be accommodated without significant changes, so I
>>>>> think the OAuth WG would be a good venue for advancing this.
>>>>> I’d be interested to hear thoughts and discussion on the list prior to
>>>>> any discussion at an interim meeting.
>>>>> — Neil
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth 
>> <https://www.ietf.org/mailman/listinfo/oauth>
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth 
> <https://www.ietf.org/mailman/listinfo/oauth>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to