The problem is that we need a 2 party, off-line model for the world of mobile devices. that should not depend on OAuth.
..tom On Mon, Sep 11, 2023 at 8:22 AM Orie Steele <orie@transmute.industries> wrote: > As far as I know, OpenID and DIF both use OAuth for these cases (the 3 > party model). > > W3C focuses only on the data model (in JSON-LD and RDF).... and lacks > the expertise to focus on the other parts (including security, and > transport considerations IMO.) > > GlobalPlatform and others are related to the area by the concept of > attestation, which is related to gaining higher confidence in the OAuth > roles (Client, Resource Server, wallet / credential issuer, etc...) > > Regarding a BoF for this topic, as opposed to extending the OAuth charter, > you might be interested in: https://mailarchive.ietf.org/arch/browse/spice > > Regardless of where the "3 party model" lands at IETF, I think there > should be coordination with JOSE, COSE, OAUTH, given their existing use in > this ecosystem... > > But that does not necessarily mean charter changes for OAuth, it could be > as simple as cross posting and seeking review where it makes sense to do so. > > Maybe a different way of gaining clarity on the same topic... If OAUTH > were to recharter, what would it include / exclude... (ignoring the 3 party > model for a second)... would attestaton be in scope? > > Regards, > > OS > > > On Sat, Sep 9, 2023 at 12:57 PM Tom Jones <thomasclinganjo...@gmail.com> > wrote: > >> +1 Denis. >> >> I cannot understand why OAuth is used in this user (or many others in >> development) as there is no authorization involved! >> >> The verifier asks the user (wallet) for data (perhaps with some back and >> forth) the user (wallet) supplies the data or not with consent to the >> conditions supplied by the verifier.There is no separate RO or >> authorization path. >> >> Starting with OAuth in these cases adds a level of complexity that is >> wholly unnecessary. >> >> ..tom >> >> >> On Sat, Sep 9, 2023 at 6:44 AM Denis <denis.i...@free.fr> wrote: >> >>> Historically, the OAuth WG has been using a model including five >>> components: the user, the Client, the AS, the RO and the RS. >>> >>> The model applicable in the context of the "three part model (issuer, >>> holder, verifier)" is rather different since there is no AS, nor RO. >>> An AS should not be confused with an Issuer. An Issuer has no >>> relationship with a verifier. >>> >>> In the "three part model", a Credential is issued by an Issuer to an >>> holder who may then derive himself from it one or more Verifiable >>> Presentations >>> without any call-back to the Issuer. The holder may then present to a RS >>> one or more Verifiable Presentations derived from Credentials issued >>> by the same or different Issuers. It is implicit that the "three part >>> model" shall support selective disclosure of the holder's attributes. >>> >>> The "three part model (issuer, holder, verifier)" involves more entities >>> / components: the user, the TEE (Trusted Execution Environment) >>> supported by the smart phone or tablet manufacturer, Trusted >>> Applications (TAs) placed into the TEE, the providers of these Trusted >>> Applications (TAs) >>> and the RichOS supported by the smart phone or tablet. Security and >>> privacy concerns can only be achieved while considering the whole chain. >>> >>> The protocols between an holder and a verifier are rather different from >>> those defined din OAuth, since in many cases they support Zero-Knowledge >>> proofs (ZKPs). >>> >>> Before designing an architecture, it is important to raise the following >>> questions: >>> >>> - Is it desirable to support linkability between verifiers and/or >>> unlinkability between verifiers ? >>> - How to bind a Verifiable Presentation to its legitimate holder >>> while also supporting the unlinkability property between verifiers ? >>> >>> IMO, bridging the architectural narrative used in the core OAuth >>> framework (AS, RS, RO) and three part model (issuer, holder, verifier) is >>> not desirable. >>> This would add confusion. Extending the OAuth charter to address the "three >>> part model" is not desirable. >>> >>> Some committees and foundations are already addressing this topic, e.g., >>> W3C, OpenID, DIF (Decentralized Identity Foundation) and GlobalPlatform >>> (for the TEE). >>> >>> The key question is: what the IETF should do (*or not do)* in this area >>> ? >>> >>> A BoF should be opened to continue this discussion. >>> >>> Denis >>> >>> Thanks for kicking off the conversation! >>> >>> Inline: >>> >>> On Fri, Sep 8, 2023 at 2:08 PM Roman Danyliw <r...@cert.org> wrote: >>> >>>> Hi! >>>> >>>> We've observed growing energy around JWT, selective disclosure and VC >>>> related topics in the WG in recent meetings. We spent almost all of the >>>> third OAuth meeting at IETF 117 on related topics. The initial SD-JWT >>>> (draft-ietf-oauth-selective-disclosure-jwt) has been followed up with >>>> SD-JWT-VC (draft-ietf-oauth-sd-jwt-vc). There is also work like >>>> draft-looker-oauth-jwt-cwt-status-list being proposed. >>>> >>>> As promised at IETF 117, we would like to start a conversation about >>>> the direction the WG would like to take at a strategic level rather than >>>> continuing to deal this topic in one document increments of additional >>>> scope. >>>> >>>> ** What's the body of work around SD/JWT/VC that should be done and how >>>> much work will that be? What needs to be done first? What unknown about >>>> the direction and needed tasks? >>>> >>>> >>> There are building blocks that "look like VC" but are actually vanilla >>> JWT / relevant outside the 3 party model. I would recommend keeping them at >>> OAuth (status list cwt is an example of this IMO). >>> >>> It's possible that a document at OAuth recognizing the data model >>> elements of the 3 party model (iss, sub, cnf, kid, etc) might help enable >>> documents outside of OAuth to better defer to OAuth for "moving tokens, or >>> leveraging successful protocols"... this could help reduce the data model >>> reinvention everywhere else, and it could drive the common understanding of >>> registered claim names to be interpreted consistently across JWT / CWT (and >>> their SD friends). >>> >>> >>> ** For whatever that work might be, how should the OAuth charter evolve >>>> to support the work? >>>> >>>> >>> I don't know, but I am happy to help : ) >>> >>> One thing that seems worth unpacking is why DCP at OIDF is leaving the >>> OIDC part behind (paraphrasing, kristina probably has a better take): >>> https://openid.net/wg/digital-credentials-protocols/ >>> >>> Are there things DCP might need from OAuth WG, how might the charter >>> align to that work? >>> >>> >>>> ** Is there work to be done around bridging the architectural narrative >>>> used in the core OAuth framework/RFC6749 (AS, RS, RO) and three part model >>>> (issuer, holder, verifier) used in >>>> draft-ietf-oauth-selective-disclosure-jwt? >>>> >>> >>> I think so? but it depends on the comment above. >>> >>> Personally I would like to see the OAuth WG tackle this head on, >>> especially because of the wallet / client / subject / holder confusion.... >>> Starting with the people we are here to serve seems like a safe way to >>> progress through the technical sugar (which I love). >>> >>> OS >>> >>> >>>> >>>> Thanks, >>>> Roman, Hannes, and Rifaat >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> >>> >>> >>> -- >>> >>> >>> ORIE STEELE Chief Technology Officer www.transmute.industries >>> >>> <https://transmute.industries> >>> >>> _______________________________________________ >>> OAuth mailing listOAuth@ietf.orghttps://www.ietf.org/mailman/listinfo/oauth >>> >>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >>> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> > > > -- > > > ORIE STEELE > Chief Technology Officer > www.transmute.industries > > <https://transmute.industries> >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth