[jose] Protocol Action: 'JSON Web Key (JWK) Thumbprint' to Proposed Standard (draft-ietf-jose-jwk-thumbprint-08.txt)

The IESG <iesg-secretary@ietf.org> Mon, 13 July 2015 19:30 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C5C91B2DAF; Mon, 13 Jul 2015 12:30:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B5TjQPy6QqtW; Mon, 13 Jul 2015 12:30:35 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A27401B2DC8; Mon, 13 Jul 2015 12:30:30 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.0.4.p3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20150713193030.21432.86909.idtracker@ietfa.amsl.com>
Date: Mon, 13 Jul 2015 12:30:30 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/jose/cO04a7w7C2ZRKUh5oQzqu9ji--k>
Cc: jose chair <jose-chairs@tools.ietf.org>, jose mailing list <jose@ietf.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [jose] Protocol Action: 'JSON Web Key (JWK) Thumbprint' to Proposed Standard (draft-ietf-jose-jwk-thumbprint-08.txt)
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.15
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2015 19:30:36 -0000

The IESG has approved the following document:
- 'JSON Web Key (JWK) Thumbprint'
  (draft-ietf-jose-jwk-thumbprint-08.txt) as Proposed Standard

This document is the product of the Javascript Object Signing and
Encryption Working Group.

The IESG contact persons are Stephen Farrell and Kathleen Moriarty.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-jose-jwk-thumbprint/





Technical Summary

This document defines a method for computing a hash value over a JSON Web Key 
structure.  The document describes what the subset of fields in a key to be used are, 
the method of creating a canonical form for those fields, and how to convert the 
resulting UNICODE string into a byte sequence appropriate for hashing.

Working Group Summary

The document has clear working group consensus for publication, and has been 
reviewed by several WG participants since its initial adoption as a working group 
item. There was some discussion over the form and content of the string to be 
hashed.  Some people advocated for the use of the current X.509 SPKI structure and 
some over use a string that was not a JSON structure.  This discussion ended without 
conclusion and thus the original proposal advanced.

Document Quality

Some in the OpenID community have implemented.
- NRI implemented as a part of Self-Issued OpenID Connect provider  http://openid.net/specs/openid-connect-core-1_0.html#SelfIssued 
- Deutsche Telekom Laboratories implemented

Personnel

Karen O'Donoghue is acting as the Document Shepherd.  Kathleen Moriarty is the 
Responsible Area Director. 

IANA Note

  This draft adds instructions for Designated experts to the process for additions to the following existing registries:
   o  JSON Web Key Types
   o  JSON Web Key Elliptic Curve
   o  JSON Web Key Parameters