Download and install please On Thu, Aug 24, 2023 at 6:50 PM <oauth-requ...@ietf.org> wrote:
> Send OAuth mailing list submissions to > oauth@ietf.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://www.ietf.org/mailman/listinfo/oauth > or, via email, send a message with subject or body 'help' to > oauth-requ...@ietf.org > > You can reach the person managing the list at > oauth-ow...@ietf.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of OAuth digest..." > > > Today's Topics: > > 1. Re: SD-JWT does not meet standard security definitions > (Watson Ladd) > 2. Re: SD-JWT does not meet standard security definitions > (Kristina Yasuda) > 3. Re: SD-JWT does not meet standard security definitions > (Watson Ladd) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 24 Aug 2023 13:07:39 -0700 > From: Watson Ladd <watsonbl...@gmail.com> > To: Daniel Fett <m...@danielfett.de> > Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>, oauth@ietf.org, > draft-ietf-oauth-selective-disclosure-jwt....@ietf.org > Subject: Re: [OAUTH-WG] SD-JWT does not meet standard security > definitions > Message-ID: > <CACsn0cm4crt-F4GJcZHGnhzcBdgZ+JL-DxJ+K=VV3L9UdXD= > y...@mail.gmail.com> > Content-Type: text/plain; charset="UTF-8" > > On Thu, Aug 24, 2023 at 3:44?AM Daniel Fett <m...@danielfett.de> wrote: > > > > Thanks, Hannes. > > > > The fact that technologies like AnonCreds are based on such old > principles, yet they are not uniformly standardized, often times limited to > a few implementations that may or may not be secure, are full of security > footguns, lack hardware support, and are just extremely hard or impossible > to deploy speaks for itself. > > > > That's why things like SD-JWT exist and gain traction. > > > > Yes, you have to jump through hoops to get unlinkability, but it is not > impossible, and it seems to be a good tradeoff for many. > > Is there a document describing this that we can compare to the BBS > version? Because it's a lot harder than you think: you need a blind > signature and cut and choose for the credential openings (or > rerandomization via structure preserving signatures, hello pairings), > you need to deal with exhaustion of the supply of tokens, your > issuance process has to be repeatable at low cost, so that's also > getting messy, and then the hardware binding has its own special > problems. None of that is in this draft, and I think it would be a lot > better if we spelled it out here or someplace else to get a better > sense of the tradeoffs. > > I would also like to point out that if end users don't like the > privacy aspects, they simply won't use this technology. That's a very > serious deployment issue. > > Sincerely, > Watson Ladd > > -- > Astra mortemque praestare gradatim > > > > ------------------------------ > > Message: 2 > Date: Thu, 24 Aug 2023 20:32:02 +0000 > From: Kristina Yasuda <kristina.yas...@microsoft.com> > To: Watson Ladd <watsonbl...@gmail.com>, Daniel Fett > <m...@danielfett.de> > Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>, "oauth@ietf.org" > <oauth@ietf.org>, > "draft-ietf-oauth-selective-disclosure-jwt....@ietf.org" > <draft-ietf-oauth-selective-disclosure-jwt....@ietf.org> > Subject: Re: [OAUTH-WG] SD-JWT does not meet standard security > definitions > Message-ID: > < > sa1pr00mb13101b25440011fd872fd7eee5...@sa1pr00mb1310.namprd00.prod.outlook.com > > > > Content-Type: text/plain; charset="utf-8" > > First of all, BBS and SD-JWT are not comparable apple to apple. BBS is a > signature scheme and it needs to be combined with few other things like JWP > or BBS data integrity proof type (https://www.w3.org/TR/vc-di-bbs/) with > JSON-LD payload. While SD-JWT is a mechanism that can be used with any > crypto suite. > > Second, how to do batch issuance of the credential (honestly, of any > credential format: not just SD-JWT VCs but also mdocs and JWT-VCs) and > whether it can be done low cost is out of scope of the credential format > (or any of its components) specification itself. Btw when using OpenID4VCI > (an extension of oauth), batch issuing SD-JWTs does not need a blind > signature and I do not know what you mean by exhaustion of the supply of > tokens, there are only access token and refresh token involved in a usual > manner. > > Best, > Kristina > > Get Outlook for iOS<https://aka.ms/o0ukef> > ________________________________ > From: Watson Ladd <watsonbl...@gmail.com> > Sent: Thursday, August 24, 2023 9:08 PM > To: Daniel Fett <m...@danielfett.de> > Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>; oauth@ietf.org < > oauth@ietf.org>; draft-ietf-oauth-selective-disclosure-jwt....@ietf.org < > draft-ietf-oauth-selective-disclosure-jwt....@ietf.org> > Subject: Re: SD-JWT does not meet standard security definitions > > [You don't often get email from watsonbl...@gmail.com. Learn why this is > important at https://aka.ms/LearnAboutSenderIdentification ] > > On Thu, Aug 24, 2023 at 3:44?AM Daniel Fett <m...@danielfett.de> wrote: > > > > Thanks, Hannes. > > > > The fact that technologies like AnonCreds are based on such old > principles, yet they are not uniformly standardized, often times limited to > a few implementations that may or may not be secure, are full of security > footguns, lack hardware support, and are just extremely hard or impossible > to deploy speaks for itself. > > > > That's why things like SD-JWT exist and gain traction. > > > > Yes, you have to jump through hoops to get unlinkability, but it is not > impossible, and it seems to be a good tradeoff for many. > > Is there a document describing this that we can compare to the BBS > version? Because it's a lot harder than you think: you need a blind > signature and cut and choose for the credential openings (or > rerandomization via structure preserving signatures, hello pairings), > you need to deal with exhaustion of the supply of tokens, your > issuance process has to be repeatable at low cost, so that's also > getting messy, and then the hardware binding has its own special > problems. None of that is in this draft, and I think it would be a lot > better if we spelled it out here or someplace else to get a better > sense of the tradeoffs. > > I would also like to point out that if end users don't like the > privacy aspects, they simply won't use this technology. That's a very > serious deployment issue. > > Sincerely, > Watson Ladd > > -- > Astra mortemque praestare gradatim > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: < > https://mailarchive.ietf.org/arch/browse/oauth/attachments/20230824/f2163fef/attachment.htm > > > > ------------------------------ > > Message: 3 > Date: Thu, 24 Aug 2023 16:49:45 -0700 > From: Watson Ladd <watsonbl...@gmail.com> > To: Kristina Yasuda <kristina.yas...@microsoft.com> > Cc: Daniel Fett <m...@danielfett.de>, Hannes Tschofenig > <hannes.tschofe...@gmx.net>, IETF oauth WG <oauth@ietf.org>, > draft-ietf-oauth-selective-disclosure-jwt....@ietf.org > Subject: Re: [OAUTH-WG] SD-JWT does not meet standard security > definitions > Message-ID: > <CACsn0cntKgk-nQf71XbdVtbVUXxwt6Njsd3pTg4TB= > g6qwh...@mail.gmail.com> > Content-Type: text/plain; charset="UTF-8" > > On Thu, Aug 24, 2023, 1:32 PM Kristina Yasuda > <kristina.yas...@microsoft.com> wrote: > > > > First of all, BBS and SD-JWT are not comparable apple to apple. BBS is a > signature scheme and it needs to be combined with few other things like JWP > or BBS data integrity proof type (https://www.w3.org/TR/vc-di-bbs/) with > JSON-LD payload. While SD-JWT is a mechanism that can be used with any > crypto suite. > > Agreed: the relevant comparison is at the level of systems based on > these formats. That makes it more difficult to have a discussion of > the security of the overall system when these documents go in other > places, and this might not be the right vehicle for it. > > > > > Second, how to do batch issuance of the credential (honestly, of any > credential format: not just SD-JWT VCs but also mdocs and JWT-VCs) and > whether it can be done low cost is out of scope of the credential format > (or any of its components) specification itself. Btw when using OpenID4VCI > (an extension of oauth), batch issuing SD-JWTs does not need a blind > signature and I do not know what you mean by exhaustion of the supply of > tokens, there are only access token and refresh token involved in a usual > manner. > > So the issuer knows what it signed? Then it's capable of linking all > presentations to each other because the signature and message is shown > to each verifier even if different commitments are opened each time. > That's a serious problem. Separately, if each SD-JWT is one use only, > then the issuer needs to be available for refresh once the tokens are > all used, which is a troublesome proposition. It's a very different > model from a one time issuance. VC usecases are likely to lend > themselves to things that don't look like oauth in terms of > availability, and as we learned from OCSP running services that must > be up is hard. > > I want to be clear: the threat model that's applicable to real people > across the web has the issuer working with data sent to the verifiers > to try to determine what the holder did. This is extremely unlike real > world credential presentation where e.g. showing my drivers license to > a bouncer doesn't mean the DMV knows what bar I went to. We have very > clear guidance in RFC 8890 from the IAB that we are supposed to take > these risks seriously, and privilege them over other considerations. > The applications to Digital Wallets when combined with a push for Age > Verification are exactly the sort of thing where people will make > expedient choices (use SD-JWT with what's being issued) in a way that > creates an enormous privacy risk that is not obvious to end users. > > Sincerely, > Watson Ladd > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > ------------------------------ > > End of OAuth Digest, Vol 178, Issue 51 > ************************************** > -- null
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth