@Christian: If you want to replace certificates with JWT/CWT (in case using it 
for QEAA acc. Art. 45b ff.) it might be meaningful regarding validation (and so 
revocation subjects) to have look into current development of ETSI EN 319 102 
(last version 03/24) which defines current signature validation and might be 
referenced by Art. 32 eIDAS

https://www.etsi.org/deliver/etsi_en/319100_319199/31910201/01.04.00_20/en_31910201v010400a.pdf
 (currently under discussion)

regarding “is a revocation mechanism needed that supports similar support for 
grace periods, verification relative to times in the past, etc.?” – in case of 
signatures (referring to your idea to replace certificates) depends on 
validation model you choose (shell vs. chain) – means IMHO the “time value” 
depends on different values

In case you need an actual time: Do you plan that your status list is signed 
(as done with OCSP)? Could not find it in your draft but maybe I have missed 
something. In case it`s signed incl. QTS you would have the timestamp you may 
think about. Only question: self-created timestamps or qualified one? Would 
recommend in this context to differentiate timestamps and metadata – and as 
timestamps (ETSI EN 319 421) contain signatures too it might lead to other 
challenges.

The statement “the statuslist is a good approach for “simple” use-cases where 
the main thing you are interested in is a current status.” I don`t understand 
because in case of “chain-model” you need a status in the past and with 
OCSP/CRL Lists it`s easily possible or is you statement related to 
https://github.com/oauth-wg/draft-ietf-oauth-status-list?


Von: Christian Bormann <chris.bormann=40gmx...@dmarc.ietf.org>
Gesendet: Sonntag, 19. Mai 2024 20:49
An: 'Rifaat Shekh-Yusef' <rifaat.s.i...@gmail.com>; 'Carl Wallace' 
<c...@redhoundsoftware.com>
Cc: 'Tschofenig, Hannes' <hannes.tschofenig=40siemens....@dmarc.ietf.org>; 
sp...@ietf.org; 'oauth' <oauth@ietf.org>
Betreff: [OAUTH-WG] Re: [lamps] Revocation and OAuth


Caution: This email originated from outside of the organization. Despite an 
upstream security check of attachments and links by Microsoft Defender for 
Office, a residual risk always remains. Only open attachments and links from 
known and trusted senders.
Hi and thanks for the feedback!

Here are my thoughts on the comments:

Should at least one of ttl and exp be required?  Why is ttl not listed for 
CBOR? Are both mechanisms needed?
- I would say no - right now we require “iat” which allows a relying party to 
make an informed decision on whether the status list is fresh enough or not; 
the issuer can add additional policy / information by providing “exp” which is 
a freshness requirement from the issuer side and an optional signal with “ttl” 
that allows more optimal fetching/caching  mechanism (a signal how fast/often 
updates can be expected – even if the information is not yet considered expired)
- This was an oversight on our part (2 PRs in parallel – one introducing ttl, 
the other one the CBOR encoding) and is fixed in the latest editor’s copy 
(https://github.com/oauth-wg/draft-ietf-oauth-status-list)
- Perhaps ttl isn’t the best name, but as mentioned before I do believe every 
claim serves its purpose

It may be worth including some words on using the uri field to partition status 
lists based on token lifetime so status lists don't linger. The uri field is 
similar to partitioning using the IDP/CDP mechanism in CRLs, so any 
partitioning scheme could work, but mentioning the concept may be helpful.
- That is a very valid point and should be part of implementation 
considerations.

Should there be a POST option for requesting a status list that provides for 
freshness via a nonce? If so, does this cause a need for delegation so a token 
signing key need not be online (i.e., maybe some identifier in the status claim 
in the referenced token)? This would make GET requests analogous to partitioned 
CRLs and POST requests analogous to OCSP with a nonce, with the extra benefit 
that both use the same format.
- That sounds like an interesting concept to combine with a more OCSP-like 
approach (and there has been some demand in that direction - e.g., Giuseppe’s 
draft 
https://peppelinux.github.io/draft-demarco-oauth-status-attestations/draft-demarco-oauth-status-attestations.html)
 but needs more thought on my side for a proper answer. We provide the 
freshness currently with iat/exp, so I am not sure the nonce would be necessary 
or add additional value?

The mechanism is simple, which is good, but the lack of a time value 
corresponding to revocation time may limit applicability. If JWTs/CWTs replace 
certificates where signature validation is well after generation, is a 
revocation mechanism needed that supports similar support for grace periods, 
verification relative to times in the past, etc? It may be worth noting cases 
where this mechanism may not be a good fit for such use cases even if not 
addressing. A POST request that accepted a time value may serve this purpose 
with no change to the status list definition, i.e., just return the response 
relative to the requested time instead of current.
- We’ve gotten this feedback a few times and are considering to add an optional 
mechanism to provide time similar to what you are describing. Related issue: 
https://github.com/oauth-wg/draft-ietf-oauth-status-list/issues/138
- That being said, we reached a point where we realized that the different 
use-cases differ in terms of privacy considerations and overall requirements 
where it  seems hard to create one approach that is a good fit for everything. 
The draft introduces “status” as an extension point for other status mechanisms 
that are better suited for other use-cases that e.g., require more metadata 
(like timestamps / more events) and we are considering adding an additional 
draft that works similar to a CRL (with an UUID and attached metadata) but in 
json/cbor form re-using parts of the statuslists draft. I do believe the 
statuslist is a good approach for “simple” use-cases where the main thing you 
are interested in is a current status.

Especially the last point is something where more feedback/discussion would be 
quite helpful imho.

Regards,
Christian

From: Rifaat Shekh-Yusef 
<rifaat.s.i...@gmail.com<mailto:rifaat.s.i...@gmail.com>>
Sent: Wednesday, May 15, 2024 2:14 PM
To: Carl Wallace <c...@redhoundsoftware.com<mailto:c...@redhoundsoftware.com>>
Cc: Tschofenig, Hannes 
<hannes.tschofenig=40siemens....@dmarc.ietf.org<mailto:hannes.tschofenig=40siemens....@dmarc.ietf.org>>;
 sp...@ietf.org<mailto:sp...@ietf.org>; oauth 
<oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: [OAUTH-WG] Re: [lamps] Revocation and OAuth

Adding the OAuth WG to this thread.

Regards,
 Rifaat


On Wed, May 15, 2024 at 7:52 AM Carl Wallace 
<c...@redhoundsoftware.com<mailto:c...@redhoundsoftware.com>> wrote:
Here're a few questions/comments from a first read of 
draft-ietf-oauth-status-list. Overall, the approach looks good to me.

Should at least one of ttl and exp be required? Why is ttl not listed for CBOR? 
Are both mechanisms needed?

It mahy be worth including some words on using the uri field to partition 
status lists based on token lifetime so status lists don't linger. The uri 
field is similar to partitioning using the IDP/CDP mechanism in CRLs, so any 
partitioning scheme could work, but mentioning the concept may be helpful.

Should there be a POST option for requesting a status list that provides for 
freshness via a nonce? If so, does this cause a need for delegation so a token 
signing key need not be online (i.e., maybe some identifier in the status claim 
in the referenced token)? This would make GET requests analogous to partitioned 
CRLs and POST requests analogous to OCSP with a nonce, with the extra benefit 
that both use the same format.

The mechanism is simple, which is good, but the lack of a time value 
corresponding to revocation time may limit applicability. If JWTs/CWTs replace 
certificates where signature validation is well after generation, is a 
revocation mechanism needed that supports similar support for grace periods, 
verification relative to times in the past, etc? It may be worth noting cases 
where this mechanism may not be a good fit for such use cases even if not 
addressing. A POST request that accepted a time value may serve this purpose 
with no change to the status list definition, i.e., just return the response 
relative to the requested time instead of current.

From: Spasm <spasm-boun...@ietf.org<mailto:spasm-boun...@ietf.org>> on behalf 
of "Tschofenig, Hannes" 
<hannes.tschofenig=40siemens....@dmarc.ietf.org<mailto:40siemens....@dmarc.ietf.org>>
Date: Friday, May 3, 2024 at 3:28 AM
To: "sp...@ietf.org<mailto:sp...@ietf.org>" 
<sp...@ietf.org<mailto:sp...@ietf.org>>
Cc: Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com<mailto:rifaat.s.i...@gmail.com>>
Subject: [lamps] Revocation and OAuth

Hi all,

At the last two IETF meetings I mentioned that the OAuth working group is 
looking into various “token” revocation mechanisms and there is a strong 
similarity with the work done in the PKIX environment. See also my HotRFC 
presentation at IETF118: Can we improve certificate/JWT/CWT revocation? 
(ietf.org)<https://datatracker.ietf.org/meeting/118/materials/slides-118-hotrfc-sessa-can-we-improve-certificatejwtcwt-revocation-00>

Rifaat and I want to make sure that we take the experience from LAMPS into 
account. Hence, we have scheduled a dedicated interim meeting on the topic of 
revocation, see
[OAUTH-WG] Invitation: OAuth WG Virtual Interim - Revocation Drafts @ Tue Jun 
11, 2024 12pm - 1pm (EDT) 
(oauth@ietf.org)<mailto:[OAUTH-WG]%20Invitation:%20OAuth%20WG%20Virtual%20Interim%20-%20Revocation%20Drafts%20@%20Tue%20Jun%2011,%202024%2012pm%20-%201pm%20(EDT)%20(oauth@ietf.org)>

It would be great if some of you could join the interim meeting.

Ciao
Hannes

_______________________________________________ Spasm mailing list 
sp...@ietf.org<mailto:sp...@ietf.org> 
https://www.ietf.org/mailman/listinfo/spasm
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to