Hi Tom,
I know that many standards editors are tasked to solve actual real life use 
cases but the existing standards do not suffice their requirements. Writing 
good standards is hard work and I think people usually don't do it without real 
needs.
18 Jan 2024 18:44:08 Tom Jones <thomasclinganjo...@gmail.com>:

> 
> The big problem is that standards bodies all over the spectrum are creating 
> attestations without even bothering to see what is happening in other 
> communities. The verifier will have many attestations to choose from and will 
> thus choose to do nothing with any of them. Perhaps it is time to ask a 
> verifier what problems they have instead of telling how to fix problems they 
> don't have currently? If it is really this hard to get this new stuff to 
> work, perhaps the new stuff is not well-designed to begin with? ..tom
> 
> 
> On Thu, Jan 18, 2024 at 1:27 AM Denis <denis.i...@free.fr> wrote:
>> Typo: Change: "proof _*or*_ origin of wallet instance"
>> into               : "proof _*of*_ origin of wallet instance".
>> 
>> The figure has been corrected below.
>> 
>> Denis
>> 
>>> Hi Giuseppe,
>>> 
>>> The current figure in the Introduction from 
>>> draft-demarco-status-attestations-latest is:
>>> 
>>> +-----------------+                             +-------------------+
>>> |                 | Requests Status Attestation |                   |
>>> |                 |---------------------------->|                   |
>>> | Wallet Instance |                             | Credential Issuer |
>>> |                 | Status Attestation          |                   |
>>> |                 |<----------------------------|                   |
>>> +-----------------+                             +-------------------+
>>> 
>>> 
>>> +-- ----------------+                             +----------+
>>> |                   | Presents credential and     |          |
>>> |  Wallet Instance  | Status Attestation          | Verifier |
>>> |                   |---------------------------->|          |
>>> +-------------------+                             +----------+
>>> 
>>> IMO, using the vocabulary agreed during the last BoF video conference, this 
>>> figure should be modified as follows:
>>> 
>>> 
>>> +------------+                                        +-------------------+
>>> |            | Requests *Digital Credential*            |                   
>>> |
>>> |            | and presents proof of knowledge of     |                   |
>>> |            | either a private key or a link secret  |                   |
>>> |            | and proof *of* origin of wallet instance | Credential Issuer 
>>> |
>>> |   Holder   |--------------------------------------->|                   |
>>> |            |                                        |                   |
>>> |            |    *Digital Credential*                  |                   
>>> |
>>> |            |<---------------------------------------|                   |
>>> +------------+                                        +-------------------+
>>> 
>>> 
>>> +-- ---------+                                        +-------------------+
>>> |            | Presents *Credential proof*              |                   
>>> |
>>> |   Holder   |                                        |      Verifier     |
>>> |            |--------------------------------------->|                   |
>>> +------------+                                        +-------------------+
>>> 
>>> Denis
>>> 
>>> 
>>>> Hi Hannes,
>>>> 
>>>> Thank you for your quick reaction and also to Orie for sharing.
>>>> I've submitted the draft, here: 
>>>> https://datatracker.ietf.org/doc/draft-demarco-status-attestations/
>>>> 
>>>> Regarding the term Attestation: good point. We have decided to use this 
>>>> term since in several IETF and OpenID drafts this term seems pretty 
>>>> established, the term Attestation is found at least in the following 
>>>> specifications:
>>>>   - Attestation based client-authentication (it's in the title)
>>>>   - OpenID4VC High Assurance Interoperability Profile with SD-JWT VC 
>>>> (wallet attestation)
>>>>   - OpenID for Verifiable Presentations - draft 20 (verifier attestation)
>>>>   - OpenID for Verifiable Credential Issuance (section "Trust between 
>>>> Wallet and Issuer": Device Attestation)
>>>> 
>>>> Meantime in the eIDAS Expert group this term is going to be changed to 
>>>> "Wallet Trust Evidence".
>>>> 
>>>> [https://datatracker.ietf.org/doc/draft-demarco-status-attestations/]I 
>>>> don't have a strong opinion on what would be the best semantic for this, I 
>>>> just have realized the functional difference between a Digital Credential 
>>>> and an Attestation:
>>>> the first requires the user to be authenticated and give consent for using 
>>>> the secure storage. The second is obtained with a machine2machine flow 
>>>> where no user interaction is required, the secure storage is not required, 
>>>> no user information is contained in it since the subject is the wallet 
>>>> instance and not the user, it cannot be (re)used without the cryptographic 
>>>> proof of possession. Probably a discussion could start about this term 
>>>> aiming to align several specifications on the same terminology. I could 
>>>> say that Status Attestation is a specific artifact defined for a specific 
>>>> context, other attestations can be defined outside the functional 
>>>> perimeter of this specification. Let's talk about it, it doesn't matters 
>>>> changing terms (eventually mindsets on perceivable meanings).
>>>> 
>>>> Here I share some notes I picked along the last two months about this 
>>>> brand new individual draft:
>>>> 
>>>> - it is related to digital credential only, I don't expect to use it in 
>>>> legacy infrastructure different from wallet. I really don't need this kind 
>>>> of mechanism in OIDC or any other traditional infrastructure since these 
>>>> doesn't show the privacy issues the wallet ecosystem has;
>>>> - it would interesting mentioning in the introduction that's pratically an 
>>>> ocsp stapling like mechanism, just to give some context (credit: Paul 
>>>> Bastien);
>>>> - The Rationale section needs to clarify better problems and solutions, 
>>>> where it seems that the problem does not exist or that it is weak. A 
>>>> review is necessary to clearly bring the benefits;
>>>> - Editorials mistake are still along the reading.
>>>> 
>>>> thank you for your time and interest,
>>>> best
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> 
>>>> Il giorno mer 17 gen 2024 alle ore 21:06 
>>>> <hannes.tschofenig=40gmx....@dmarc.ietf.org> ha scritto:
>>>>> 
>>>>> Hi Guiseppe, Francesco, Orie,
>>>>> 
>>>>>  
>>>>> 
>>>>> @Orie: Thanks for sharing the draft.
>>>>> 
>>>>>  
>>>>> 
>>>>> As a quick reaction: It would be good to invent a new term for 
>>>>> “attestation” in draft-demarco-status-attestations.html because this term 
>>>>> is already widely used in a different context (see RFC 9334).
>>>>> 
>>>>>  
>>>>> 
>>>>> @Guiseppe and Francesco: It would be great if you could submit your draft 
>>>>> to OAuth or SPICE for discussion.
>>>>> 
>>>>>  
>>>>> 
>>>>> Ciao
>>>>> 
>>>>> Hannes
>>>>> 
>>>>>  
>>>>> 
>>>>>  
>>>>> 
>>>>> *From:* OAuth <oauth-boun...@ietf.org> *On Behalf Of *Orie Steele
>>>>> *Sent:* Mittwoch, 17. Jänner 2024 19:07
>>>>> *To:* sp...@ietf.org
>>>>> *Cc:* oauth <oauth@ietf.org>
>>>>> *Subject:* [OAUTH-WG] OAuth Digital Credential Status Attestations
>>>>> 
>>>>>  
>>>>> 
>>>>> Hello Digital Credential Enthusiasts,
>>>>> 
>>>>> See: 
>>>>> https://peppelinux.github.io/draft-demarco-status-attestations/draft-demarco-status-attestations.html
>>>>> 
>>>>> Note the use of the term digital credential, and the alignment to CWT 
>>>>> based credentials and CWT based credential status lists.
>>>>> 
>>>>> As a quick summary of the editors draft above:
>>>>> 
>>>>> It is basically a refresh-token-like approach to dynamic state, where the 
>>>>> holder retrieves updated state from the issuer at regular intervals, and 
>>>>> can then present that dynamic state directly to the verifier.
>>>>> 
>>>>> This eliminates the herd privacy and phone home issues associated with 
>>>>> W3C Bitstring Status Lists.
>>>>> 
>>>>> And it informs the holder of dynamic state, so the digital wallet can 
>>>>> provide a better user experience.
>>>>> 
>>>>> However, an issuer (government or ngo) could use the interval of 
>>>>> requesting dynamic state, to track the holder... so the guidance from 
>>>>> https://datatracker.ietf.org/doc/draft-steele-spice-oblivious-credential-state/
>>>>> 
>>>>> Is also relevant to this draft.
>>>>> 
>>>>> I also learned that 
>>>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/
>>>>> 
>>>>> Has defined a new property for expressing "Verifiable Credential" "type" 
>>>>> `vct`, which is different from how W3C defines credential types.
>>>>> 
>>>>> W3C uses the expanded IRI for the graph node type, based on the JSON-LD 
>>>>> context.
>>>>> 
>>>>> For example with:
>>>>> 
>>>>> {
>>>>>   "@context": [
>>>>>     "https://www.w3.org/ns/credentials/v2";,
>>>>>     "https://www.w3.org/ns/credentials/examples/v2";
>>>>>   ],
>>>>>   "id": "http://university.example/credentials/1872";,
>>>>>   "type": ["VerifiableCredential", "ExampleAlumniCredential"],
>>>>>   ...
>>>>> }
>>>>> 
>>>>> The credential type in RDF becomes 
>>>>> "https://www.w3.org/ns/credentials/examples#ExampleAlumniCredential";
>>>>> 
>>>>> Which is different from "ExampleAlumniCredential" in JSON... More 
>>>>> evidence that RDF leads to developer confusion regarding safe typing.
>>>>> 
>>>>> The OAuth solution does not have this confusing issue, they set the type 
>>>>> explicitly:
>>>>> 
>>>>> {
>>>>>  "vct": "https://credentials.example.com/identity_credential";,
>>>>>  "given_name": "John",
>>>>>  "family_name": "Doe",
>>>>>  "email": "john...@example.com",
>>>>>  "phone_number": "+1-202-555-0101",
>>>>>  "address": {
>>>>>    "street_address": "123 Main St",
>>>>>    "locality": "Anytown",
>>>>>    "region": "Anystate",
>>>>>    "country": "US"
>>>>>  },
>>>>>  "birthdate": "1940-01-01",
>>>>>  "is_over_18": true,
>>>>>  "is_over_21": true,
>>>>>  "is_over_65": true,
>>>>>  "status": {
>>>>>     "status_attestation": {
>>>>>         "credential_hash_alg": "S256",
>>>>>     }
>>>>>  }
>>>>> }
>>>>> 
>>>>> Regards,
>>>>> 
>>>>> OS
>>>>> 
>>>>> -- 
>>>>> 
>>>>>  
>>>>> 
>>>>> *ORIE STEELE
>>>>> *Chief Technology Officer
>>>>> www.transmute.industries[http://www.transmute.industries]
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to