Re: [OAUTH-WG] Standardizing Attestation Tokens

2018-06-21 Thread Hannes Tschofenig
I guess this is a piece of info we should have mentioned somewhere. Yes, the idea is to use a TEE for that purpose. At least for Arm, TrustZone for v8-M even brings TEE capabilities to the low-end IoT devices and the first products are already on the market. Ciao Hannes From: Eliot Lear [mailto

Re: [OAUTH-WG] Standardizing Attestation Tokens

2018-06-21 Thread Eliot Lear
By the way, a lot *has* changed.  If we can use the TEE to get signed information out... if *it* is the attester, that's a pretty big benefit.  That just leaves the protocol gorp.  But one needs to know that there is a TEE. On 21.06.18 22:04, Hannes Tschofenig wrote: > > That’s a good question, E

Re: [OAUTH-WG] Standardizing Attestation Tokens

2018-06-21 Thread Hannes Tschofenig
That’s a good question, Eliot. Let me put something together for the IETF meeting From: Eliot Lear [mailto:l...@cisco.com] Sent: 21 June 2018 20:17 To: Hannes Tschofenig; oauth@ietf.org Cc: Laurence Lundblade; e...@ietf.org Subject: Re: [OAUTH-WG] Standardizing Attestation Tokens Hi Hannes, Th

Re: [OAUTH-WG] Standardizing Attestation Tokens

2018-06-21 Thread Eliot Lear
Hi Hannes, The draft is interesting, but it looks a bit like NEA.  How would this vary, apart from the CoAP part and a different registry?  Seems to me the real magic is how the device is interrogated such that the consumer of this information has confidence as to its validity.  The protocol bits

[OAUTH-WG] Standardizing Attestation Tokens

2018-06-21 Thread Hannes Tschofenig
Hi all, I would like to make you aware of work that will be discussed on attestation on the EAT mailing list. Here is the link to the list: https://www.ietf.org/mailman/listinfo/eat Here is a document describing the idea: https://tools.ietf.org/html/draft-mandyam-eat-00 The work is relevant for

Re: [OAUTH-WG] Dynamic Scopes

2018-06-21 Thread Nat Sakimura
It depends on the use case but if you are talking about payment etc., putting the transaction details in the scope and sending it over the regular RFC6749 redirect to the authorization server is inherently a bad idea, as it is not protected. My preference by far is to set up a staging endpoint and