Skip to content

Commit

Permalink
Merge pull request #1 from webpush-wg/peterb_review
Browse files Browse the repository at this point in the history
Reducing options for application servers
  • Loading branch information
martinthomson committed Oct 19, 2015
2 parents 03dbb12 + 7b107a6 commit 2e657c1
Showing 1 changed file with 14 additions and 5 deletions.
19 changes: 14 additions & 5 deletions draft-ietf-webpush-encryption.md
Original file line number Diff line number Diff line change
Expand Up @@ -184,12 +184,9 @@ to calculate the content encryption key as defined in Section 3.2 of
The Application Server then encrypts the payload. Header fields are populated
with URL-safe base-64 encoded [RFC4648] values:

* the "keyid" from the User Agent is added to both the Encryption-Key and
Encryption header fields;
* the salt is added to the `salt` parameter of the Encryption header field; and

* the salt is added to the "salt" parameter of the Encryption header field; and

* the public key for its DH or ECDH key pair is placed in the "dh" parameter of
* the public key for its DH or ECDH key pair is placed in the `dh` parameter of
the Encryption-Key header field.

An application server MUST encrypt a push message with a single record. This
Expand All @@ -201,6 +198,18 @@ Note that a push service is not required to support more than 4096 octets of
payload body, which equates to 4080 octets of cleartext, so the `rs` parameter
can be omitted for messages that fit within this limit.

An application server MUST NOT use other content encodings for push messages.
In particular, content encodings that compress could result in leaking of push
message contents. The Content-Encoding header field therefore has exactly one
value, which is `aesgcm128`.

An application server MUST include exactly one entry in each of the Encryption
and Encryption-Key header fields. This allows the `keyid` parameter to be
omitted from both header fields.

An application server MUST NOT include a `key` parameter in the Encryption
header field.


# Message Decryption

Expand Down

0 comments on commit 2e657c1

Please sign in to comment.