The ADs can make edits. Go ahead and propose your edits via this email
thread.

Paul

On Wed, Jul 31, 2024 at 12:45 PM Brian Campbell <bcampb...@pingidentity.com>
wrote:

> I honestly don't know. Perhaps the copied AD or someone on the receiving
> end of the also copied rfc-edi...@rfc-editor.org can advise on the best
> course of action with respect to the errata process.
>
> On Wed, Jul 31, 2024 at 8:01 AM Pieter Kasselman <pieter.kasselman=
> 40microsoft....@dmarc.ietf.org> wrote:
>
>> Thanks Brain – is there a way to edit errata, or do I just submit another
>> one?
>>
>>
>>
>> *From:* Brian Campbell <bcampbell=40pingidentity....@dmarc.ietf.org>
>> *Sent:* Wednesday, July 31, 2024 2:49 PM
>> *To:* RFC Errata System <rfc-edi...@rfc-editor.org>
>> *Cc:* m...@microsoft.com; n-sakim...@nri.co.jp; paul.wout...@aiven.io;
>> prkassel...@gmail.com; oauth@ietf.org
>> *Subject:* [OAUTH-WG] Re: [Technical Errata Reported] RFC7519 (8060)
>>
>>
>>
>>
>>
>> That is a good catch of an inconsistency in JWT/RFC7519 that is deserving
>> of errata. Note however that JWE/RFC7516 says that the "rules about
>> handling Header Parameters that are not understood by the implementation
>> are also the same [as JWS]"* so the correcting errata text should probably
>> be more generally applicable to all JWTs.
>>
>>
>>
>> * see https://datatracker.ietf.org/doc/html/rfc7516#section-4
>>
>>
>>
>> On Wed, Jul 31, 2024 at 7:27 AM RFC Errata System <
>> rfc-edi...@rfc-editor.org> wrote:
>>
>> The following errata report has been submitted for RFC7519,
>> "JSON Web Token (JWT)".
>>
>> --------------------------------------
>> You may review the report below and at:
>> https://www.rfc-editor.org/errata/eid8060
>>
>> --------------------------------------
>> Type: Technical
>> Reported by: Pieter Kasselman <prkassel...@gmail.com>
>>
>> Section: 7.2
>>
>> Original Text
>> -------------
>>    5.   Verify that the resulting JOSE Header includes only parameters
>>         and values whose syntax and semantics are both understood and
>>         supported or that are specified as being ignored when not
>>         understood.
>>
>> Corrected Text
>> --------------
>>    5.   Verify that the resulting JOSE Header includes only parameters
>>         and values whose syntax and semantics are both understood and
>>         supported or that are specified as being ignored when not
>>         understood. If the JWT is a JWS, the steps specified in
>>         RFC7515 takes precedence when validating JOSE Header parameters.
>>
>> Notes
>> -----
>> Validation step 5 in section 7.2 of RFC 7519 states that header
>> parameters should only be ignored if they are explicitly specified as
>> needing to be ignored.
>>
>> This is contrary to step 7 in section 7.2 which requires that the
>> processing rules of RFC 1515 be used if the JWT is a JWS (defined in RFC
>> 1515). RFC 7515 does not include any special provisions for only ignoring
>> header parameters if they are specified as being ignored, but instead
>> requires all header parameters to be ignored if they are not understood
>> (repeated below for convenience).
>>
>> "Unless listed as a critical Header Parameter, per
>>    Section 4.1.11, all Header Parameters not defined by this
>>    specification MUST be ignored when not understood."
>>
>> A discussion with the authors at IETF 120 confirmed that all header
>> parameters that are not understood must be ignored.
>>
>> The proposed errata aims to clarify that if the JWT is a JWS, the
>> processing rules of RFC 7151 should apply (including ignoring header
>> parameters that are not understood). This is consistent with point 7.2,
>> which requires that RFC 7515 [JWS] rules applies and avoids the impression
>> that a new requirement on when parameters are ignored is being introduced
>> in (i.e. the need to be explicitly defined as needing to be ignored).
>>
>> Instructions:
>> -------------
>> This erratum is currently posted as "Reported". (If it is spam, it
>> will be removed shortly by the RFC Production Center.) Please
>> use "Reply All" to discuss whether it should be verified or
>> rejected. When a decision is reached, the verifying party
>> will log in to change the status and edit the report, if necessary.
>>
>> --------------------------------------
>> RFC7519 (draft-ietf-oauth-json-web-token-32)
>> --------------------------------------
>> Title               : JSON Web Token (JWT)
>> Publication Date    : May 2015
>> Author(s)           : M. Jones, J. Bradley, N. Sakimura
>> Category            : PROPOSED STANDARD
>> Source              : Web Authorization Protocol
>> Stream              : IETF
>> Verifying Party     : IESG
>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
>>
>> *CONFIDENTIALITY NOTICE: This email may contain confidential and
>> privileged material for the sole use of the intended recipient(s). Any
>> review, use, distribution or disclosure by others is strictly prohibited.
>> If you have received this communication in error, please notify the sender
>> immediately by e-mail and delete the message and any file attachments from
>> your computer. Thank you.*
>>
>
> *CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly prohibited.
> If you have received this communication in error, please notify the sender
> immediately by e-mail and delete the message and any file attachments from
> your computer. Thank you.*
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to