-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch to JWS and JWE #36
Comments
If we going to use json, we can use json compactibility standard |
+1 for the use of JWE and JWS, except I propose we also support using EC On Fri Jan 30 2015 at 3:16:42 PM kalloc notifications@github.com wrote:
|
Looks like a good idea but I would like to play devil's advocate here: Are these not still in draft mode - meaning they are liable to change? |
So is the idea to use those for encrypting/signing pki.io specific JSON objects? Basically using them as the containers (document.container)? If so, they'd need to support
I personally wouldn't be too worry about them being draft. We can double check things, but half of the Internet is based on things in draft, and at least they're unlikely to change frequently compared to packages we depend on. |
Tge way i understand it is jwe/jws are used for the secure transport of On Tue, Feb 3, 2015, 1:24 AM Fraser Scott notifications@github.com wrote:
|
hmm, have to be careful here with the difference between securing data at rest vs data in motion. I presume the json stuff works on data at rest, so hybrid encryption of documents. This can be used of course to secure the data in the absence of TLS, but you wouldn't get PFS because of its asynchronous nature. This is then solving the same problem as I have done with the document.containers. If it is somehow designed as a data-in-motion alternative to TLS, then it might have properties that make it unsuitable for data-at-rest. I guess a bit of reading it to it would be good, but I'm going to continue my focus on the workflows. We can switch later if that suites us. |
We want transport between nodes. |
I understand, this is draft, but it's prefer than new standard (if we will not make new one) |
Looking at this again, it seems to be transport security, so it makes more sense to utilize ECDH than ECIES. ECDH is already recommended for JWS/JWE implementations as per the JWA RFC, so I don't think there is an issue there. ECDH is a key agreement protocol. |
I suppose, then, I am misunderstanding the purpose of JWE/JWS. To me, it On Tue Feb 03 2015 at 9:39:42 AM kalloc notifications@github.com wrote:
|
Moving to read as not assigned to anyone. |
No description provided.
The text was updated successfully, but these errors were encountered: