I need my payments
Seth Landry

On Wed, Jul 31, 2024 at 8:07 AM, <oauth-requ...@ietf.org> wrote:

Send OAuth mailing list submissions to
oauth@ietf.org

To subscribe or unsubscribe via email, send a message with subject or
body 'help' to
oauth-requ...@ietf.org

You can reach the person managing the list at
oauth-ow...@ietf.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of OAuth digest..."

Today's Topics:

1. Re: We cannot trust Issuers (Brian Campbell)


----------------------------------------------------------------------

Message: 1
Date: Wed, 31 Jul 2024 06:31:21 -0600
From: Brian Campbell <bcampb...@pingidentity.com>
Subject: [OAUTH-WG] Re: We cannot trust Issuers
To: Leif Johansson <le...@mnt.se>
Cc: IETF oauth WG <oauth@ietf.org>
Message-ID:
<CA+k3eCQom6=o+fSYWRd+qWZnWqki3Enij1X8tYhn75Ksuz=j...@mail.gmail.com>
Content-Type: multipart/alternative;
boundary="00000000000020500b061e8a473a"

On Tue, Jul 23, 2024 at 11:15 AM Leif Johansson <le...@mnt.se> wrote:

> On Mon, 2024-07-22 at 19:43 -0400, Richard Barnes wrote:
> > I would observe that any solution based on garden-variety digital
> > signature (not something zero-knowledge like BBS / JWP) will have
> > problems with issuer/verifier collusion. One-time tokens and batch
> > issuance don't help. There is no such thing as SD-JWT with
> > issuer/verifier collusion resistance. At best you could have SD-JWP.
> >
> > I don't think this needs to be a blocker on SD-JWT. There are use
> > cases that don't require issuer/verifier collusion resistance. We
> > should be clear on the security considerations and warn people away
> > who care about issuer/verifier collusion resistance, and accelerate
> > work on SD-JWP if that's an important property to folks.
> >
>
>
> +1 on this
>

I'm generally a +1 on this too. There is an attempt at a discussion around
unlinkablity in the privacy considerations at
https://www.ietf.org/archive/id/draft-ietf-oauth-selective-disclosure-jwt-10.html#name-unlinkability
currently. Concrete suggestions to that text about how to better frame the
risks and difficulties around Issuer/Verifier Unlinkability (perhaps
especially with respect to something like a government issuer compelling
collusion from verifiers) would be welcome for consideration.

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged
material for the sole use of the intended recipient(s). Any review, use,
distribution or disclosure by others is strictly prohibited.  If you have
received this communication in error, please notify the sender immediately
by e-mail and delete the message and any file attachments from your
computer. Thank you._
-------------- next part --------------
A message part incompatible with plain text digests has been removed ...
Name: not available
Type: text/html
Size: 2919 bytes
Desc: not available

------------------------------

Subject: Digest Footer

_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org


------------------------------

End of OAuth Digest, Vol 189, Issue 37
**************************************
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to