[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - Revocation Drafts @ Tue Jun 11, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-06-12 Thread Giuseppe De Marco
Thank you Rifaat and Arndt and also Paul, Cristian, Kristina and Oliver for their valuable questions (many of those embedding the answer in the smart way they use to do). In particular for the github issues and the actions that me and other author will be able to achieve, like: - optioanlly

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-12 Thread Giuseppe De Marco
me in the URL. What is the problem with the relying party taking a > certificate and validating the issue domain name directly using the same > certificate? > > Thanks, > -rohan > > On Wed, Jun 12, 2024 at 7:59 AM Giuseppe De Marco > wrote: > >> This depends on the ev

[OAUTH-WG] Re: [SPICE] Re: OAuth Digital Credential Status Attestations

2024-06-12 Thread Giuseppe De Marco
Hey D Il giorno mer 12 giu 2024 alle ore 13:54 Denis ha scritto: > Hi Giuseppe, > > Thank you for your response that was sent rather early today. :-) > > This draft might be paving the way for *a* solution that might be adopted > for the EUIDW > ... or even paving the way for *THE* solution

[OAUTH-WG] Re: [SPICE] Re: OAuth Digital Credential Status Attestations

2024-06-12 Thread Giuseppe De Marco
t; Sometimes the verifier may verify the status assertion/attestation > signature to assure that the credential is available recently. > > Personally I think, bloom filter may cause false positive, which will > result the verifier in wrong decision. Verifier should avoid to use bloom > filter

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-12 Thread Giuseppe De Marco
PKI root for the same purpose (validating the > domain name of the issuer) with the same validity period (between the > notBefore and notAfter of the certificate)? > > Thanks, > -rohan > > On Tue, Jun 11, 2024 at 4:44 AM Giuseppe De Marco > wrote: > >> Ciao Tom,

[OAUTH-WG] Re: [SPICE] Re: OAuth Digital Credential Status Attestations

2024-06-11 Thread Giuseppe De Marco
Ciao Denis, thank you for the time spent in reading and writing, I see several points that express an enormous gratitude from me for your contribution. I add my feedbacks below. Il giorno mar 11 giu 2024 alle ore 18:12 Denis ha scritto: > > The text of the email states: > > "there are several

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-11 Thread Giuseppe De Marco
Ciao Tom, Public Key Infrastructure satisfies the requirements to provide public keys. Technically, using X.509 certificates represents a consolidated approach. Giving public keys doesn't help in establishing the trust or fully proving the compliance to shared rules, that's why openid federation

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-11 Thread Giuseppe De Marco
how the issuer intends the keys to be used (for > issuing ID tokens vs. Verifiable Credentials, say). Happy to have that > filed as a first issue on an adopted document. > > Cheers, > --Richard > > > On Mon, Jun 10, 2024 at 6:50 PM Giuseppe De Marco > wrote: &

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Giuseppe De Marco
Hi, I appreciate the introduction of PIKA, which demonstrates a commitment to addressing current challenges. However, I have identified some key areas of concern that need attention: 1. The current documentation lacks clarity regarding the number and scope of cryptographic keys, particularly in

[OAUTH-WG] Re: OAuth Digital Credential Status Attestations

2024-06-10 Thread Giuseppe De Marco
Hello Everybody, OAuth Status Assertions replaces OAuth Status Attestations and it is published here: https://datatracker.ietf.org/doc/draft-demarco-oauth-status-assertions/ Therefore here its html preview: https://www.ietf.org/archive/id/draft-demarco-oauth-status-assertions-00.html Compared

[OAUTH-WG] Re: Second WGLC for OAuth 2.0 Protected Resource Metadata

2024-05-17 Thread Giuseppe De Marco
+1 for publication Il giorno mer 15 mag 2024 alle ore 16:11 Rifaat Shekh-Yusef < rifaat.s.i...@gmail.com> ha scritto: > All, > > This is a *second* *WG Last Call* for the *OAuth 2.0 Protected Resource > Metadata* document (the previous one was for v03.). >

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-v2-1-11.txt

2024-05-16 Thread Giuseppe De Marco
Thank you Aaron, great work +1 Il mer 15 mag 2024, 02:29 Aaron Parecki ha scritto: > Hi all, > > Thanks for the productive discussion at the interim meeting today. I've > taken the feedback and published a new version with all the changes > discussed. > >

Re: [OAUTH-WG] WGLC for OAuth 2.0 Protected Resource Metadata

2024-03-29 Thread Giuseppe De Marco
gratitude goes out to the authors for their foundational work and to everyone involved for their valuable revisions. Regards, Giuseppe De Marco [1] https://italia.github.io/spid-cie-oidc-docs/en/metadata_aa.html [2] https://www.agid.gov.it/sites/default/files/repository_files/llgg_attribute_authorities_0

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations

2024-02-07 Thread Giuseppe De Marco
hese few notes in the privacy consideration section as well, really appreciate your mindset Denis, best Il giorno mer 7 feb 2024 alle ore 14:12 Giuseppe De Marco < demarco...@gmail.com> ha scritto: > Ciao Denis, > > I agree with you until I find that the presentation/credential

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations

2024-02-07 Thread Giuseppe De Marco
Ciao Denis, I agree with you until I find that the presentation/credential format has the feature to attest its (non-)revocation. I was a BLS signature evangelist at least two years ago. Working in the government field, I am now required to use formats that are globally recognized and

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations

2024-02-07 Thread Giuseppe De Marco
Ciao Denis, OAuth Status Attestation was born because of some different approches with the oauth status list token, I really would like to have a single specification with the two approaches. I report below and explain the main differences between the status attestation and the status list token.

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-02-06 Thread Giuseppe De Marco
gt;>> There should first be an agreement to add both a Security >>>> Consideration section and a Privacy Consideration section to the ARF. >>>> >>> >>>> >>> Another consideration has been raised: the cryptographic algorithms &g

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-02-06 Thread Giuseppe De Marco
Hi Denis, sorry for the delay, below by points. > A *digital credential* may be presented to a verifier long after it has been issued. In the abstract we say what's the status attestation. Probably it's an editorial suggestion from you to say what's the substantial difference between the

Re: [OAUTH-WG] IETF119 - Call for topics

2024-02-01 Thread Giuseppe De Marco
Ciao Rifaat, John will present the following draft at the next IETF meeting. After that we would like to do a call for adoption as a WG item. https://github.com/peppelinux/draft-demarco-cose-header-federation-trust-chain best Il giorno mar 30 gen 2024 alle ore 23:00 Rifaat Shekh-Yusef <

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-18 Thread Giuseppe De Marco
Ciao Denis, thank you for the quick reply and for your contribution. The scope of the current draft is to provide a verifiable artifact that give the proof that a specific credential is active, then not revoked. >From your sequence diagram I read a digital credential issuance, while this is not

Re: [OAUTH-WG] OAuth Digital Credential Status Attestations

2024-01-17 Thread Giuseppe De Marco
Hi Hannes, Thank you for your quick reaction and also to Orie for sharing. I've submitted the draft, here: https://datatracker.ietf.org/doc/draft-demarco-status-attestations/ Regarding the term Attestation: good point. We have decided to use this term since in several IETF and OpenID drafts this

Re: [OAUTH-WG] Call for adoption - Identity Chaining

2023-11-18 Thread Giuseppe De Marco
Very interesting work, it reminds me the SPID Attribute Authorities, where the users give their consent during the authentication, granting the RPs to consume RS on behalf of users the AS/OP issues several grant tokens (JWT Embedded Tokens) as many consent give by the user to each Attribute

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-06 Thread Giuseppe De Marco
Hi, everytime I have implemented SAML2, OAuth 2.0, OpenID Connect, for different projects and orgs, I have included secured web cookie in the recipe. For the implementation profile of OpenID4VP I did the same, where the secured and httponly cookie is used an in particular as a basic security

Re: [OAUTH-WG] Call for adoption - JWT and CWT Status List

2023-09-30 Thread Giuseppe De Marco
I support the adoption Regards Il sab 30 set 2023, 14:53 Rifaat Shekh-Yusef ha scritto: > All, > > This is an official call for adoption for the *JWT and CWT Status List* > draft: > https://datatracker.ietf.org/doc/draft-looker-oauth-jwt-cwt-status-list/ > > Please, reply *on the mailing list

Re: [OAUTH-WG] OAuth and JWT/VC documents

2023-09-29 Thread Giuseppe De Marco
Ciao Rifaat I can say in the vest of an implementer, that VC documents are like unrequited love, you know you need it but it's not something you can build on. Here I represent many organizations that are working to build on these, with deadlines. I express my strong support for these brand new

Re: [OAUTH-WG] OAuth and JWT/VC documents

2023-09-29 Thread Giuseppe De Marco
Hi, I'm fashinated by these interpretation processes. It sounds resonable having mapped the OAuth roles in three types: Issuer or AS Holder or Client Verifier or RP even if we try to keep things simple the real world continuosly breaks the plans (as in the society the genders ...). We often

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-23 Thread Giuseppe De Marco
Hi, I support the adoption. Il mer 23 ago 2023, 21:02 Rifaat Shekh-Yusef ha scritto: > All, > > This is an official call for adoption for the *Protected Resource > Metadata* draft: > https://datatracker.ietf.org/doc/draft-jones-oauth-resource-metadata/ > > Please, reply on the mailing list and

Re: [OAUTH-WG] Call for adoption -

2023-07-29 Thread Giuseppe De Marco
I support Attestation-Based Client Authentication Il sab 29 lug 2023, 22:17 Brian Campbell ha scritto: > I am in favor of adoption. > > On Sat, Jul 29, 2023, 1:27 PM Rifaat Shekh-Yusef > wrote: > >> All, >> >> This is an official call for adoption for the *Attestation-Based Client >>

Re: [OAUTH-WG] Call for adoption - SD-JWT-based Verifiable Credentials

2023-07-29 Thread Giuseppe De Marco
I support SD-JWT-based Verifiable Credentials Il sab 29 lug 2023, 22:16 Brian Campbell ha scritto: > +1 > > On Sat, Jul 29, 2023, 1:37 PM Michael Prorock wrote: > >> I support adoption - but would request that if a group dedicated to >> verifiable credentials is created prior to this draft

Re: [OAUTH-WG] OAuth 2.0 Protected Resource Metadata now with WWW-Authenticate

2023-07-25 Thread Giuseppe De Marco
Hi, I am happy that this draft is progressing, draft 01 was adopted two years ago for the Italian Attribute Authorities (SPID Attribute Authorities) because there was a need to publish the metadata of a RS. I see that many steps forward have been made and in a short time. I have read Brian's

Re: [OAUTH-WG] Request for Feedback on "SD-JWT VC" Draft Specification

2023-05-26 Thread Giuseppe De Marco
Hi, I support sd-jwt-vc with the will to contribute to its evolution and use it in the wallet solutions under development Il ven 26 mag 2023, 16:57 Oliver Terbu ha scritto: > Dear all, > > I hope this email finds you well. I am writing to introduce "SD-JWT-based > Verifiable Credentials with

[OAUTH-WG] OAuth 2.0 Protected Resource Metadata

2023-01-24 Thread Giuseppe De Marco
Hello everybody, I would like to bring to your attention this expired draft: https://datatracker.ietf.org/doc/draft-jones-oauth-resource-metadata/ I propose the take up this individual draft for its adoption as an official internet draft. The reason I ask this is that there are implementations

Re: [OAUTH-WG] Call for adoption: Cross-Device Flows

2022-11-15 Thread Giuseppe De Marco
+1 for the adoption! Il mar 15 nov 2022, 15:43 Rifaat Shekh-Yusef ha scritto: > All, > > During the IETF meeting last week, there was a strong support for > the adoption of the following document as a WG document: > https://datatracker.ietf.org/doc/draft-kasselman-cross-device-security/ > >

Re: [OAUTH-WG] DPoP - Impementations

2022-08-11 Thread Giuseppe De Marco
Hi Riifat, In italy DPoP was adopted in the Attribute Authority Infrastructure, below a quick overview with few details https://docs.google.com/document/d/11KQPEs7sln7DbxLN7r7q3j2PymBSrYNlx5o-W3xHQsw/ the italian

Re: [OAUTH-WG] Call for adoption - SD-JWT

2022-08-02 Thread Giuseppe De Marco
Hi Neil, The problem of the linkability affects both sd-jwt (opaque values) and traditional jwt (readable values). Even if I present an mDL or an sd-jwt without disclosing any user attribute in It, the linkability Is possible exploting the VC itself and its public key, adopted as proof of

Re: [OAUTH-WG] Call for adoption - SD-JWT

2022-08-01 Thread Giuseppe De Marco
Hi David, This issue was already raised. Below the proposal for both draft and python code https://github.com/oauthstuff/draft-selective-disclosure-jwt/pull/124 Regarding the privacy I'd like to have a combined presentation format that makes the PID/QEAA (VC) untraceable (jwe, with variable iat

Re: [OAUTH-WG] Call for adoption - SD-JWT

2022-07-29 Thread Giuseppe De Marco
With its salted/hashed approach SD-JWT rapresents the solution that allows the selective disclosure of the claim values in a JWT, it's a concrete alternative to ISO 18013-5 (mDoc) and also proposes a very interesting integration with JWT-VC (vc-data-model 1.1). Considering that in eIDAS 2 we