In some ways this is related to the question about disclosures.

On Fri, Oct 20, 2023 at 9:03 AM Daniel Fett <fett=
40danielfett...@dmarc.ietf.org> wrote:

> At least at the moment I don't think that there is a huge need for such a
> feature. I don't think that we should clutter the existing SD-JWT data
> structures with such information.
>
I tend to agree with the latter.

There is substantial security / privacy risk, making disclosures carry ANY
information other than what the issuer committed to.


> If required, it could go into a separate data structure in the SD-JWT, for
> example a list of JSON pointers with a mapping to the respective redaction
> reasons.
>

This assumes the issuer knows why the holder chose not to disclose a
field.... For some use cases that's probably a knowable thing... it also
prevents the holder from using the disclosures as an unsecured channel to
communicate with the verifier.


> -Daniel
> Am 18.10.23 um 05:03 schrieb Tom Jones:
>
> That's leaking the existence of PII. That requires permission of the
> subject. I think it's way more complicated than you think.
>
> thx ..Tom (mobile)
>
> On Tue, Oct 17, 2023, 6:20 AM Orie Steele <orie@transmute.industries>
> <orie@transmute.industries> wrote:
>
>> Hello,
>>
>> In government documents that feature redaction, it's common for the
>> redaction to be given a reason.
>>
>> For example, in the Mueller report, we can see "Harm to Ongoing Matter",
>> "Personal Privacy", "Investigative Technique", as well as "IT" and "HOM".
>>
>> In SD-JWT we see the following:
>>
>> Case 1
>>
>> "_sd": [
>>       "IjCRF...znc", // disclosure hash
>>       "Qdpt9pL...lhU9UDo" // disclosure hash
>> ]
>>
>> and
>>
>> Case 2
>>
>> { "...": "Qdpt9pLE2-MjCr...IzhZlhU9UDo" // disclosure hash  }
>>
>> After verification and applying disclosures these annotations are no
>> longer present.
>>
>> I wonder if it would be worth allowing a reason for why a holder might
>> have retained a redaction (or chose not to disclose for a reason).
>>
>> Since the payload is committed to by the issuer, this information would
>> have to be present in the disclosures collection for the SD-JWT.
>>
>> Here is an example disclosure:
>>
>> [
>>   "8UbQ9NZ6xseoDqMW_Bd50A", // salt
>>   "type", // json object key (always a string)
>>   [ // json object value
>>     "VerifiableCredential",
>>     "ExampleAlumniCredential"
>>   ]
>> ]
>>
>> Consider the following strawman syntax for disclosing a redaction reason:
>>
>> {
>>   "disclosure hash" : "Personal Privacy" || "Harm to Ongoing Matter"
>> }
>>
>> This allows a UI to map the redaction reason into a presentation (ui)
>> layer for the issuer secured payload.
>>
>> Since it's an unsecured object, it can be extended with other fields at
>> the discretion of the holder or issuer.
>>
>> However it might be secured by nesting it inside another JWT or SD-JWT.
>>
>> It would only slightly complicate the verification logic, you would need
>> to filter any encoded disclosures by the `ey` prefix, since they will never
>> be found in the payload, as we know they will hash differently than array
>> encoded disclosures, which will be found in the payload.
>>
>> I'll be giving a presentation on this topic to the W3C Credentials
>> community group later today, happy to shuttle their reactions back to this
>> list.
>>
>> Apologies if this has been discussed previously.
>>
>> Regards,
>>
>> OS
>>
>>
>> --
>>
>>
>> ORIE STEELE Chief Technology Officer www.transmute.industries
>>
>> <https://transmute.industries>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
> _______________________________________________
> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth
>
> --
> Please use my new email address: m...@danielfett.de
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>


-- 


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to