Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

-00 feedback from ilari #22

Open
OR13 opened this issue Aug 16, 2024 · 3 comments
Open

-00 feedback from ilari #22

OR13 opened this issue Aug 16, 2024 · 3 comments

Comments

@OR13
Copy link
Collaborator

OR13 commented Aug 16, 2024

https://mailarchive.ietf.org/arch/msg/cose/PCJQ7S7IMnZLWxjI677Wv-qeLaI/

@OR13
Copy link
Collaborator Author

OR13 commented Aug 19, 2024

No

- Should payload_hash_alg be required to be critical?

We should write some text providing guidance for this... IMO better to say it MAY be marked critical.

- Assuming payload_hash_alg just causes content to be pre-hashed,
  then how do payload_preimage_content_type and 'content type'
  differ?

I think this one is addressed.

- Maybe add protected header for preimage length. So that applications
  don't have to deal with over-large responses from HTTP servers (which
  could cause problems).

  Something like:

  &(payload_preimage_content_length: TBD_4) => uint

  If payload_hash_alg just causes prehashing, maybe call it
  'content length' or something.

I don't understand this comment, we should get clarity on the list.

- Picking the same hash function as the signature does not guarantee
 equal strength, because some signatures have internal collision
 mitigations (e.g., EdDSA, ML-DSA and SLH-DSA).

This is missing the point of the original text, which just says "align" as in... dont use sha1 with P521... I tried to eleaborate on this with the ES384 example

@OR13
Copy link
Collaborator Author

OR13 commented Aug 28, 2024

This comment is relevant: https://mailarchive.ietf.org/arch/msg/cose/JonuJfnRwpR7wlmZ40Vyt-uuwoY/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants