On Tue, Jul 23, 2024 at 11:15 AM Leif Johansson <le...@mnt.se> wrote:
> On Mon, 2024-07-22 at 19:43 -0400, Richard Barnes wrote: > > I would observe that any solution based on garden-variety digital > > signature (not something zero-knowledge like BBS / JWP) will have > > problems with issuer/verifier collusion. One-time tokens and batch > > issuance don't help. There is no such thing as SD-JWT with > > issuer/verifier collusion resistance. At best you could have SD-JWP. > > > > I don't think this needs to be a blocker on SD-JWT. There are use > > cases that don't require issuer/verifier collusion resistance. We > > should be clear on the security considerations and warn people away > > who care about issuer/verifier collusion resistance, and accelerate > > work on SD-JWP if that's an important property to folks. > > > > > +1 on this > I'm generally a +1 on this too. There is an attempt at a discussion around unlinkablity in the privacy considerations at https://www.ietf.org/archive/id/draft-ietf-oauth-selective-disclosure-jwt-10.html#name-unlinkability currently. Concrete suggestions to that text about how to better frame the risks and difficulties around Issuer/Verifier Unlinkability (perhaps especially with respect to something like a government issuer compelling collusion from verifiers) would be welcome for consideration. -- _CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited. If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you._
_______________________________________________ OAuth mailing list -- oauth@ietf.org To unsubscribe send an email to oauth-le...@ietf.org