- From: Kumar McMillan <kmcmillan@mozilla.com>
- Date: Tue, 6 Aug 2013 17:31:44 -0500
- To: Manu Sporny <msporny@digitalbazaar.com>
- Cc: Web Payments <public-webpayments@w3.org>
On Aug 5, 2013, at 8:02 PM, Manu Sporny <msporny@digitalbazaar.com> wrote: > On 08/05/2013 01:01 PM, Kumar McMillan wrote: >>> > > They can still implement it among agents that want to support the new > encryption scheme. For example, if Elliptic Curve Crypto is desired, the > digital signature can change from this: > > > to this: > > { > ... > "signature": > { > "@type": "EccGraphSignature2013", > "creator": "http://manu.sporny.org/keys/6", > "signatureValue": "OGQzNG ... IyZTk=" > } > } Thanks, I see how it works now. Out of curiosity, how is this a valid argument then? from the article: "the most common argument against the Secure Messaging spec...is that it lacks the same amount of cryptographic algorithm agility that the JWA specification provides." It sounds like a custom signature addresses that problem, no? You can add a custom algorithm in a similar manner for encryption, right? > At present, I think we have production-quality JavaScript, PHP, and > Python implementations of the JSON-LD normalization algorithm. It has > also been implemented in C++ at one point, but we abandoned that > implementation as no one seemed to be using it. This may be a concern for us in mozPay(). Stable JWT libs exist for more languages: Python, Ruby, Node.JS, PHP, Java, and .NET. In each language there are typically multiple JWT libs to choose from. I don't know what the usage is of each but Ruby and Java seem important for adoption among our intended audience: back-end web developers. > >> When I see key sorting I >> get a little nervous since non-ascii sorting (for example) may not >> always work the same across platforms. > > The sorting is done on UTF-8 strings. Are you saying that UTF-8 sorting > doesn't work the same across platforms? If it's always in UTF-8 then that's probably fine. I have more of a gut reaction than anything else ;) I've seen a fair share of subtle sorting bugs. btw, we've already seen some JWT problems where an implementation accidentally used base64 decoding instead of *URL safe* base64 decoding (as specified). Reading specs is hard. -Kumar
Received on Tuesday, 6 August 2013 22:32:12 UTC