[OAUTH-WG] Re: oauth-selective-disclosure-jwt Pull 451 is insufficient

2024-08-22 Thread Tom Jones
I completely agree that education of users is not an answer to any security question. Be the change you want to see in the world ..tom On Thu, Aug 22, 2024 at 10:08 AM Watson Ladd wrote: > Hello, > > I would like to point out that the issuer verifier problem still > remains open, even given th

[OAUTH-WG] Re: Call for adoption - PIKA

2024-09-16 Thread Tom Jones
now. Peace ..tom jones On Mon, Sep 16, 2024 at 12:56 PM Michael Jones wrote: > I regret to have to report that the issues that I believe resulted in the > first call for adoption failing, despite being discussed on-list and at > IETF 120, have not been addressed in the specification >

Re: [OAUTH-WG] OAuth Request JSON Encoding

2020-07-13 Thread Tom Jones
What, exactly is json encoding? It sounds like a python or java method. Afaik json can be encoded in utf 8 16 or 32. But form encoding is limited to ascii or even to base64url .. Is that the point. Will GNAP specify one encoding? thx ..Tom (mobile) On Thu, Jul 9, 2020, 12:29 PM Justin Richer wro

Re: [OAUTH-WG] OAuth Request JSON Encoding

2020-07-13 Thread Tom Jones
ahh - thx - so that explains why RFC 6749 OAuth 2.0 is ambiguous on the topic. I suspect that means that GNAP will take a dependency on 8259, Peace ..tom On Mon, Jul 13, 2020 at 8:34 AM Carsten Bormann wrote: > On 2020-07-13, at 17:19, Tom Jones wrote: > > > > What, exactly i

Re: [OAUTH-WG] OAuth 2.0 Attestation-Based Client Authentication

2023-07-25 Thread Tom Jones
I have concerns, similar to Orie's, about assertions. Like Orie, I would like to see something like this approved, but it must be secure. The following is the part of the draft that concerns me. Therefore, the client generates a key (Client Instance Key) and (platform specific) attestations to

Re: [OAUTH-WG] OAuth 2.0 Attestation-Based Client Authentication

2023-07-26 Thread Tom Jones
You really need to make it clear that these are native not web. Please point me to demo. thx ..Tom (mobile) On Wed, Jul 26, 2023, 2:32 PM Paul Bastian wrote: > Hello Tom, > The client attestation draft does not make any suggestions on the > architecture but gives a general purpose mechanism ho

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-26 Thread Tom Jones
Right Philippe - there really is no way to create a secure client as a web app. You would need access to the trusted execution environment, which is not available. ..tom On Sat, Aug 26, 2023 at 5:21 AM Philippe De Ryck < phili...@pragmaticwebsecurity.com> wrote: > My responses inline. > > > H

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-26 Thread Tom Jones
The security reason for exclusion of error codes and other information is that the data helps the attacker subvert the app. I continue my attempt to avoid helping the attacker. thx ..Tom (mobile) On Sat, Aug 26, 2023, 7:58 AM Dick Hardt wrote: > Jaimandeep: Do I understand your objection to ado

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-27 Thread Tom Jones
You can write your code as strong as you wish. You cannot determine if the code running in the computer is that code running unaltered. ..tom On Sun, Aug 27, 2023 at 5:25 AM Yannick Majoros wrote: > Thanks for taking the time to respond and for the constructive feedback. > > Still, there is som

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Tom Jones
is not secure enough for >their responsibilities. > > > S > > søn. 27. aug. 2023 kl. 18:41 skrev Yannick Majoros : > >> Yes, but this is true for all flows. Web applications are dangerous. >> Applications handling user input are dangerous too. >> >> Le d

Re: [OAUTH-WG] OAuth and JWT/VC documents

2023-09-09 Thread Tom Jones
+1 Denis. I cannot understand why OAuth is used in this user (or many others in development) as there is no authorization involved! The verifier asks the user (wallet) for data (perhaps with some back and forth) the user (wallet) supplies the data or not with consent to the conditions supplied by

Re: [OAUTH-WG] OAuth and JWT/VC documents

2023-09-11 Thread Tom Jones
es sense to do so. > > Maybe a different way of gaining clarity on the same topic... If OAUTH > were to recharter, what would it include / exclude... (ignoring the 3 party > model for a second)... would attestaton be in scope? > > Regards, > > OS > > > On Sat, Sep 9,

Re: [OAUTH-WG] [External Sender] Re: Questions on OAuth Protected Resource Metadata

2023-09-26 Thread Tom Jones
Kind of interesting to consider this to be a security consideration. It depends on whose security is being considered. I have always thought that the only way for the subject to approach a request for data is as a privacy threat. The attacker is the "client" every time. Sometimes it is something at

Re: [OAUTH-WG] Reservations and observations about draft JWT and CWT Status List

2023-10-03 Thread Tom Jones
Attackers do not stick to the rules. It sounds to me like one of the security considerations for any standard that employs json, or any other structured data language, is to ensure that the input is validated to be compliant. I have been in the position of trying to enforce type checking on experie

Re: [OAUTH-WG] SD-JWT Redaction Reasons

2023-10-17 Thread Tom Jones
That's leaking the existence of PII. That requires permission of the subject. I think it's way more complicated than you think. thx ..Tom (mobile) On Tue, Oct 17, 2023, 6:20 AM Orie Steele wrote: > Hello, > > In government documents that feature redaction, it's common for the > redaction to be

Re: [OAUTH-WG] sub_id in draft for Transaction tokens

2023-10-29 Thread Tom Jones
It makes sense to me that the sub should always be the subject of an issued token. thx ..Tom (mobile) On Sun, Oct 29, 2023, 7:54 PM Justin Richer wrote: > I disagree with the utility of just "sub" here. The subject of the token > is always contextual to the issuer of that subject - however, the

Re: [OAUTH-WG] [External Sender] Call for adoption - Identity Chaining

2023-11-14 Thread Tom Jones
This sounds like an attempt to re-enable 3rd party cookies. Are you seriously considering allowing access to a user's camera from one client to another w/o user consent? This is the sort of stuff that gives the web a bad name! ..tom On Tue, Nov 14, 2023 at 10:20 AM Atul Tulshibagwale wrote: > I

Re: [OAUTH-WG] Request to add a profile parameter to +jwt and +sd-jwt

2023-11-28 Thread Tom Jones
I agree with Mike. This exercise seems to add confusion rather than clarity. thx ..Tom (mobile) On Tue, Nov 28, 2023, 10:05 AM Michael Jones wrote: > Orie, you wrote: > > > > TLDR; TallTed believes that the convention in the JWT BCP is not correct: > > https://datatracker.ietf.org/doc/html/rfc8

Re: [OAUTH-WG] Request to add a profile parameter to +jwt and +sd-jwt

2023-11-28 Thread Tom Jones
JWT > > Secevents or a JWT credential might define parameterization. For example, > a credential might describe itself as having particular types/profiles of > claims about a subject, such as being usable as a driving license and as a > primary government-issued identification. > >

Re: [OAUTH-WG] [Errata Rejected] RFC7519 (5648)

2024-01-11 Thread Tom Jones
Pronounce jwt as tho it were a Welsh word. It comes out close. More like joot thx ..Tom (mobile) On Thu, Jan 11, 2024, 6:53 PM RFC Errata System wrote: > The following errata report has been rejected for RFC7519, > "JSON Web Token (JWT)". > > -- > You may re

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-18 Thread Tom Jones
The big problem is that standards bodies all over the spectrum are creating attestations without even bothering to see what is happening in other communities. The verifier will have many attestations to choose from and will thus choose to do nothing with any of them. Perhaps it is time to ask a ver

Re: [OAUTH-WG] [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-18 Thread Tom Jones
al carries the > status.status_attestation object this is the element that gives to the RP > the hint to looks in the vp_tokens for the status attestation. > > and they all lived happily ever after, please help me find some problem > > > -- > *Da:*

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-19 Thread Tom Jones
Proof seems to be yet another term for which we already have other terms. Can anyone explain the difference between: proof presentation evidence. ..tom On Fri, Jan 19, 2024 at 4:28 AM Denis wrote: > Hi Giuseppe, > > Ciao Denis, > > Thank you! By points. > > First, I still have a vocabulary pro

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-21 Thread Tom Jones
texts. . (like proof -> a cryptographic ability that is verifiable) Perhaps you don't care that these are incorrect uses of the word? ..tom On Fri, Jan 19, 2024 at 10:46 AM wrote: > You present evidence as proof. > > > On 2024-01-19 12:50, Tom Jones wrote: > > > Proo

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-21 Thread Tom Jones
; Best > > Don > > And for the record I am not a technologist. I am a person who tries to > solve business problems. > > > > On 2024-01-21 11:08, Tom Jones wrote: > > yes - i see that's what you are doing and think it is not only wrong, but > misleading. &g

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-21 Thread Tom Jones
it is far from complete. https://tcwiki.azurewebsites.net/index.php?title=Verifiable_Presentation#Full_Text_or_Meme ..tom On Sun, Jan 21, 2024 at 1:03 PM Tom Jones wrote: > Technically oauth is about authorization not authentication. And > technically attestation is provided by rats a

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-22 Thread Tom Jones
't process VCs, their > computers do. (Hence the terminology of User Agent, not user, in the > W3C) > > > > On Sun, Jan 21, 2024 at 4:46 PM Tom Jones > wrote: > > > > I should have added - if you get a verifiable presentation from a wallet > with a verifi

Re: [OAUTH-WG] R: [SPICE] OAuth Digital Credential Status Attestations (typo)

2024-01-23 Thread Tom Jones
gt; required. > > Key binding is basically the secured version of a W3C VP, but restricted > to a single credential, instead of multiple credentials. > > Key binding is not required afaik. > > Therefore presentation can be forwarded / reused. > > OS > > On Tue, Jan

Re: [OAUTH-WG] [Technical Errata Reported] RFC7591 (7782)

2024-01-26 Thread Tom Jones
The whole thing is pointless as the client owner (as opposed to the subject for which client status is requested) can just define the instances to be the same. There can be no way to attest to the validity of such an assertion. thx ..Tom (mobile) On Fri, Jan 26, 2024, 10:42 AM Justin Richer wrot

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-status-list-01.txt

2024-02-06 Thread Tom Jones
I think the proposal should be renamed as optimized data mining. AIs around the world will love the idea. Herd privacy is utter nonsense and has been from the beginning. On Tue, Feb 6, 2024, 5:08 AM Denis wrote: > Comments on draft-ietf-oauth-status-list-01.txt > > The text states: > > *11.* *Pr

Re: [OAUTH-WG] FW: Call for consensus on SPICE charter

2024-02-09 Thread Tom Jones
Not sure if techies care, but that really needs to be a four party transaction where the subject of a credential may not be the holder of the device where the credential is held. Your are thereby excluding appropriately 15% of humanity. This is, frankly, unconscionable and you must accommodate all

Re: [OAUTH-WG] Type Metadata for SD-JWT VC

2024-04-03 Thread Tom Jones
So now we are proposing types of types of types of data elements. I feel really bad about this as I introduced the first semantic tag into EDI back in the 1980s. I can't believe it has come to this. I can't believe that anyone imagines giving this sort of specification to different programmers and

Re: [OAUTH-WG] [SPICE] SPICE Revocation

2024-04-06 Thread Tom Jones
There is a huge hole here. Revocation of (for example) driving privileges should not impact the use of the cred for other purposes. The revocation idea can lead to cancelation of the person. Some that violates the fundamental rights of human beings. Revocation is basically discrimination. thx ..To

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-08 Thread Tom Jones
Y'all are missing another option. (re Sam's Comments) The user is given a user agent to use on their own device when accessing enterprise data. I know of two that are shipping today. https://www.getprimary.com/ Now it is possible to access other sites with these browsers as well - in fact they spec

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-11 Thread Tom Jones
Right. Google treats email as a guid for user name. Any old guid should work. thx ..Tom (mobile) On Sat, May 11, 2024, 3:22 PM Dick Hardt wrote: > > > On Wed, May 8, 2024 at 4:07 PM Sam Goto > wrote: > >> That's easier to answer: the browser needs name/email/picture to >> construct an account

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-21 Thread Tom Jones
Has anyone considered what information the RP verifier should supply for FedCM to function well on the behalf of both the verifier and the user? thx ..Tom (mobile) On Thu, May 9, 2024, 8:06 AM Dick Hardt wrote: > The NASCAR problem is rooted in the RP does not know which provider(s) the > user

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-21 Thread Tom Jones
/1n7HobJ6QTsNld5rn1uuIiNw0A__L44ug/edit?usp=sharing&ouid=109794657323597753486&rtpof=true&sd=true ..tom On Thu, May 9, 2024 at 10:01 AM Sam Goto wrote: > > > On Thu, May 9, 2024 at 9:07 AM Tom Jones > wrote: > >> Has anyone considered what information the RP verif

[OAUTH-WG] Re: Invitation: OAuth WG Virtual Interim - FedCM @ Tue May 7, 2024 12pm - 1pm (EDT) (oauth@ietf.org)

2024-05-21 Thread Tom Jones
Question - how does all this interact with the password manager? Can the RP ask if they have an entry in the PM first? Or is that too much of a privacy issue? Also when calling for an app, wouldn't it matter if the app were web vs native? Which one does this thread discuss? ..tom On Tue, May 21,

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Tom Jones
This whole problem did not need to happen. When the federation spec was being created I asked them not to deviate unnecessarily from pki. But the very guys that are on this thread told me that they were not a pki and so there was no reason for them to follow existing rules. This is entirely a probl

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-12 Thread Tom Jones
> >>>>> TLS is not removed, we use X.509 based pki on the web, therefore also >>>>> using federation. >>>>> >>>>> TLS is used to establish confidentiality with an endpoint, >>>>> establishing trust to a subject only because it c

[OAUTH-WG] Re: Security Bug | Unintended usage of "state" parameter can lead to Header Injection Attacks

2024-07-01 Thread Tom Jones
I am utterly appalled by this statement " opaque value, OAuth implementors usually don't sanitize the value." No web site should ever use any data from the user's device without full validation as it is *completely untrustworthy*. Treating this head value differently than any other header value is

[OAUTH-WG] Re: Call for adoption - PIKA

2024-07-03 Thread Tom Jones
I have opposed channel-binding or token-binding from the beginning as they serve very different puppies and typically fall under different management within large enterprises. I have tried to push for a simple way to test the validity of a signature for decades into the future as that is typical fo

[OAUTH-WG] Re: We cannot trust Issuers

2024-07-31 Thread Tom Jones
There are many cases of verifiers colliding with issuers. Police recording all traffic stops looking for patters of abuse. One time time and similar use restrictions on tokens. Patterns of use that indicate fraud or abuse of financial or tracking by third parties. Password or vendor relations apps.

[OAUTH-WG] Re: SD-JWT and Unlinkability

2024-09-21 Thread Tom Jones
that doesn't answer the question about users randomly selecting some to store and some to reject. This seems to me like user private information. As is most of the feedback to the issuer from the wallet. Peace ..tom jones On Sat, Sep 21, 2024 at 7:30 AM Daniel Fett wrote: > Hi Dick, &

[OAUTH-WG] Re: Call for adoption - PIKA

2024-09-18 Thread Tom Jones
As I tried to make clear in an earlier post - there is no such thing as a TLS cert. Various attributes MUST be included in TLS certs and that combination is well known and easy to request. thx ..Tom (mobile) On Wed, Sep 18, 2024, 12:44 PM Michael Jones wrote: > Hi Richard, > > > > We clearly ha

[OAUTH-WG] Re: Call for adoption - PIKA

2024-09-17 Thread Tom Jones
es of the PKI for the actual purpose of the key and cert. Peace ..tom jones On Tue, Sep 17, 2024 at 1:01 PM Vladimir Dzhuvinov wrote: > I frankly don't see how the central premise of PIKA - the reliance on a > TLS web domain certificate - can be made to work in practice. > > >

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-26 Thread Tom Jones
So - what trust infrastructure "needs to exist". That's a real question that deserves a real answer. Not clear who has the smarts and authority to do that. Peace ..tom jones On Thu, Dec 26, 2024 at 10:08 AM Pierce Gorman wrote: > What mechanism(s) are you referring to that

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-26 Thread Tom Jones
This problem was clearly demonstrated by the California mDL hackathon where the default presentation was ALL DATA. That is the easiest path, so it remains the one most taken. We have known since standards were first introduced that they immediately create a drive to the bottom. This will be the fat

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-26 Thread Tom Jones
I am appalled! All humans must adapt to the consent plans of this small standards group! I for one do not plan to adapt - sorry about that! Peace ..tom jones On Thu, Dec 26, 2024 at 4:15 PM David Waite wrote: > > > > On Dec 26, 2024, at 10:38 AM, Tom Jones > wrote: > >

[OAUTH-WG] Re: SD-JWT linkability

2024-12-16 Thread Tom Jones
admirable, but there are no UX people involved in the discussion. Peace ..tom jones On Wed, Dec 11, 2024 at 5:01 PM Watson Ladd wrote: > Dear all, > > I'd like to propose the following edit to resolve the concerns I have > around endorsing dangerous applications of SD-JWT: &g

[OAUTH-WG] Re: SD-JWT linkability

2024-12-16 Thread Tom Jones
not be used for other purposes without the person's consent. Clearly information holders can do what they want with their own data. Peace ..tom jones On Mon, Dec 16, 2024 at 11:22 AM Pierce Gorman wrote: > I think I disagree. I assume an SD-JWT in a VP could be volunteered by a

[OAUTH-WG] Re: SD-JWT linkability

2024-12-17 Thread Tom Jones
in OID4VP. In that case the selective disclosure will be irrelevant as the means to disclose the selection will be inadequate. So the SD-JWT may well technically work, but the first use will be fraudulent as the selection will not be by informed user consent. Peace ..tom jones On Tue, Dec 17, 2

[OAUTH-WG] Re: SD-JWT linkability

2024-12-17 Thread Tom Jones
> for one purpose to the police for another? This would legally not work > > > > *Von:* Tom Jones > *Gesendet:* Dienstag, 17. Dezember 2024 02:26 > *An:* Pierce Gorman > *Cc:* pe...@acm.org; IETF oauth WG > *Betreff:* [OAUTH-WG] Re: SD-JWT linkability > > > &

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-24 Thread Tom Jones
don't release the ID number. Peace ..tom jones On Tue, Dec 24, 2024 at 6:34 AM Watson Ladd wrote: > I see that people are uncomfortable with making any mandates, and so I've > tried to be purely descriptive in this proposal. I leave it to the WG to > decide where to put it, but

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-24 Thread Tom Jones
if by ID you mean ID number - then it is a tracking number. Isn't it super obvious - why are we pretending to be privacy enabling? Peace ..tom jones On Tue, Dec 24, 2024 at 10:15 AM Wayne Chang wrote: > Tom, how do you feel about private sector issued ID? > > Best, > Wayn

[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

2024-12-24 Thread Tom Jones
binding to the holder. That would be a good thing - but the only way I know involves trusting the telco - which we all know is a dead end. What other mechanism can bind the holder to the device w/o the telco (or do we just nationalize the telcos again.) Peace ..tom jones On Tue, Dec 24, 2024 at