I agree that the best thing is one alg per kid.
However getting people especially those using x509 Certs to alg is a challenge.
People still want to do pkcs1.5 pss sha256 sha512 off of one key.
With composite keys you need the alg to know the hash using x509 Certs.
I think more advice for a
On Thu, Apr 2, 2015 at 4:39 PM, John Bradley wrote:
> A given issuer may be allowed to sign using both ECDSA and RSA PKCS 1.5
> and that would not be a problem until one of them is deprecated.
> Having libraries assume that there can only be one alg per issuer would
> not lead to useful crypto ag
On Thu, Apr 2, 2015 at 2:42 PM, Mike Jones
wrote:
> This warning is already in place in
> https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-7.2.
> It says:
>
>Finally, note that it is an application decision which algorithms may
>be used in a given context. Even if a
al Message-
> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Hannes Tschofenig
> Sent: Thursday, April 02, 2015 11:28 AM
> To: Tim McLean
> Cc: oauth@ietf.org; j...@ietf.org
> Subject: Re: [OAUTH-WG] [jose] Security research on JWT implementations
>
> [[adding oauth@i
th-boun...@ietf.org] On Behalf Of Hannes Tschofenig
> Sent: Thursday, April 02, 2015 11:28 AM
> To: Tim McLean
> Cc: oauth@ietf.org; j...@ietf.org
> Subject: Re: [OAUTH-WG] [jose] Security research on JWT implementations
>
> [[adding oauth@ietf.org]]
>
> On 04/02/2015 08:01 PM,
@ietf.org; j...@ietf.org
Subject: Re: [OAUTH-WG] [jose] Security research on JWT implementations
[[adding oauth@ietf.org]]
On 04/02/2015 08:01 PM, Tim McLean wrote:
> However, I do think one way of gauging the success of JWS/JOSE is to
> measure how many implementers actually get the security d
[[adding oauth@ietf.org]]
On 04/02/2015 08:01 PM, Tim McLean wrote:
> However, I do think one way of gauging the success of JWS/JOSE is to
> measure how many implementers actually get the security details right.
I agree with you.
If several people got this wrong then it is a good idea to write