El jue., 1 dic. 2022 9:19 a. m., <oauth-requ...@ietf.org> escribió:
> Send OAuth mailing list submissions to > oauth@ietf.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://www.ietf.org/mailman/listinfo/oauth > or, via email, send a message with subject or body 'help' to > oauth-requ...@ietf.org > > You can reach the person managing the list at > oauth-ow...@ietf.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of OAuth digest..." > > > Today's Topics: > > 1. Question regarding RFC 7636 (KAMPANAT THUMWONG) > 2. Re: mails (KAMPANAT THUMWONG) > 3. Re: draft-ietf-oauth-selective-disclosure-jwt (Denis) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Thu, 1 Dec 2022 15:15:51 +0700 > From: KAMPANAT THUMWONG <1992kongpc....@gmail.com> > To: oauth@ietf.org > Subject: [OAUTH-WG] Question regarding RFC 7636 > Message-ID: > < > caff0tnhkhsp3xuqy57k_pt-4axkd9m86p6ad_y9n5lwmfzs...@mail.gmail.com> > Content-Type: text/plain; charset="utf-8" > > 1992kongpc....@gmail.com > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: < > https://mailarchive.ietf.org/arch/browse/oauth/attachments/20221201/9c9c6417/attachment.htm > > > > ------------------------------ > > Message: 2 > Date: Thu, 1 Dec 2022 15:31:52 +0700 > From: KAMPANAT THUMWONG <1992kongpc....@gmail.com> > To: OAuth@ietf.org > Subject: Re: [OAUTH-WG] mails > Message-ID: > <CAFF0TNHN70Dr8jZ= > isqgyr8fw26db7yksa3aveg409civyx...@mail.gmail.com> > Content-Type: text/plain; charset="utf-8" > > > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: < > https://mailarchive.ietf.org/arch/browse/oauth/attachments/20221201/b2072ad9/attachment.htm > > > > ------------------------------ > > Message: 3 > Date: Thu, 1 Dec 2022 15:18:52 +0100 > From: Denis <denis.i...@free.fr> > To: oauth@ietf.org > Subject: Re: [OAUTH-WG] draft-ietf-oauth-selective-disclosure-jwt > Message-ID: <bb01ca46-c82b-fd4e-e04d-ddddcbc31...@free.fr> > Content-Type: text/plain; charset="utf-8"; Format="flowed" > > Hi Brian, > > My two cents. > > 1) This draft is about selective-disclosure. The draft should be > balanced between enclosure and disclosure. > The topic of selective-enclosure should also be addressed. > > In particular in OAuth, the claims to be incorporated are usually only > selected with a coarse granularity > and the end-user (as well as the holder) has no clue about which claims > will or will not be incorporated. > > 2) The draft states: > > ???????????? However, anyone receiving an unencrypted JWT can read all > of the claims. > > In OAuth, the claims are considered to be opaque and SHALL not be read > by the holder. Their semantics or content of a JWT can change at any time. > This should be mentioned in the draft. > > In the privacy considerations section, another sub-section should be > included about OAuth, i.e. a section "8.3? OAuth". > > OAuth considers that the claims included into the JWT are opaque to the > holder (i.e. the Client) when a JWT is used in the context of OAuth. > This means that the holder is unable to verify that the claims that have > been incorporated in the JWT correspond to those that have been requested. > > The Issuer is a position to include more claims or different claims from > those that should have been incorporated. This may be a concern for some > end users. > > 3) About section 8.2 Unlinkability > > The text states: > > ?????????? More advanced cryptographic schemes, outside the scope of > this specification, can be used to prevent this type of linkability. > > The draft by itself creates the problem since a single JWT is intended > for multiple verifiers. > The linkability problem arises because in particular when the same "sub" > claim is used for two different Verifiers. > > The use of the following claims should be avoided (I reuse one of the > examples): > > ???? "given_name": "John", > "family_name": "Doe", > "email": "john...@example.com", > "phone_number": "+1-202-555-0101", > "address": { > "street_address": "123 Main St", > "locality": "Anytown", > "region": "Anystate", > "country": "US" > }, > "birthdate": "1940-01-01 > > In order to solve the problem, the use of previous claims should be > avoided and a specific "sub" claim should be used for each verifier. > > Hence, the concern could be solved using no " advanced cryptographic > schemes " but by defining a new structure in the JWT that would allow > to associate a "sub" claim (as well as other claims) with a specific > Verifier. A change of the SD-JWT Releases structure should be considered. > > The use of this draft for end users concerned with some forms of > linkages between verifiers should be deprecated > and this should be mentioned in the Introduction: a single JWT targeted > to a single Verifier solves this concern. > > Denis > > > > Hi Hannes, > > > > Though I am yet to officially have my name on the document as a > > co-author, you did mention me directly :) And so I'll attempt to > > answer or respond to your questions/statements below. > > > > On Mon, Nov 28, 2022 at 7:24 AM Hannes Tschofenig > > <hannes.tschofe...@arm.com> wrote: > > > > Hi Daniel, Hi Kristina, Hi Brian, > > > > Hi all, > > > > Reading through draft-ietf-oauth-selective-disclosure-jwt I was > > wondering why the document defines new terminology for roles that > > already exist in OAuth. > > > > For example: > > > > * Issuer ?= ?AS > > * Holder = Client > > * Verifier = RS > > > > I assume that was done intentionally. What was the rational was. > > > > > > JWT itself <https://datatracker.ietf.org/doc/rfc7519/> is a product of > > this WG (as I'm sure you remember).. While JWT had important > > applications in OAuth, it was developed as a more general purpose > > token format and has seen widespread usage both in OAuth and beyond. > > Similarly, SD-JWT is meant to be a general purpose selective > > disclosure mechanism for JWT, which can have applications in OAuth but > > is certainly not constrained to OAuth. As such, the terminology in the > > draft aims to be generally applicable/meaningful. This is > > similar/consistent with JWT/RFC7519, which also does not use terms > > like AS, RS, or client. > > > > ?You write: > > > > ??One of the common use cases of a signed JWT is representing a > > user's identity? > > > > ?In classical OAuth this use case should not be common. We bragged > > about the fact that you could to delegated authorization without > > having to rely on identity information. I think it would help to > > expand this statement a bit and explain what the use case is. > > > > A signed JWT representing a user's identity is, in fact, exceedingly > > common. Even in classical OAuth the access tokens almost always convey > > something about an identity - the resource owner in OAuth parlance. > > The sub in introspection > > https://www.rfc-editor.org/rfc/rfc7662#section-2.2 and the JWT AT > > profile https://datatracker.ietf.org/doc/html/rfc9068#section-2.2 show > > this in specs, for example. Of course the AT format and content aren't > > defined by OAuth itself and are left up to the > > implementation/deployment so those optional specs don't tell the whole > > story. But every single deployment I've seen has some identity info in > > the AT for delegation. > > > > You write: > > > > ? As long as the signed JWT is one-time use, it typically only > > contains those claims the user has consented to disclose to a > > specific Verifier. However, there is an increasing number of use > > cases where a signed JWT is created once and then used a number of > > times by the user (the "Holder" of the JWT). In such cases, the > > signed JWT needs to contain the superset of all claims the user of > > the signed JWT might want to disclose to Verifiers at some point. > > The ability to selectively disclose a subset of these claims > > depending on the Verifier becomes crucial to ensure minimum > > disclosure and prevent Verifiers from obtaining claims irrelevant > > for the transaction at hand.? > > > > ?Using the same access token with multiple resource servers is not > > good security practice not only from a privacy point of view but > > also from a security point of view. > > > > ?From reading the introduction I get the impression that you > > create your own problem that is subsequently solved in the > > document. Since I believe you are too clever to do this, I believe > > the document needs to provide more text to explain how this use > > case emerged. You mention ?verifiable credential? as the ?use > > case? but it is a technology rather than a use case. > > > > > > I've reread the introduction (which, in full disclosure, I did not > > write) and honestly feel like it does a pretty decent job of > > describing the emerging problem space and what the draft aims to > > provide. We certainly don't want to leave you or any reader with the > > impression that the document invents a not-real problem only to > > subsequently solve it. But I'm not getting that impression from > > reading it. And I am honestly not sure how to better avoid giving that > > impression (other than writing this email, I guess). > > > > > > /CONFIDENTIALITY NOTICE: This email may contain confidential and > > privileged material for the sole use of the intended recipient(s). Any > > review, use, distribution or disclosure by others is strictly > > prohibited.? If you have received this communication in error, please > > notify the sender immediately by e-mail and delete the message and any > > file attachments from your computer. Thank you./ > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: < > https://mailarchive.ietf.org/arch/browse/oauth/attachments/20221201/4b7e4925/attachment.htm > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > ------------------------------ > > End of OAuth Digest, Vol 170, Issue 1 > ************************************* >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth