[OAUTH-WG] Re: Status List Feature Request

2025-02-07 Thread Steffen Schwalm
: Freitag, 7. Februar 2025 18:56 An: Steffen Schwalm Cc: oauth@ietf.org Betreff: Re: [OAUTH-WG] Re: Status List Feature Request Caution: This email originated from outside of the organization. Despite an upstream security check of attachments and links by Microsoft Defender for Office, a residual risk

[OAUTH-WG] Re: Status List Feature Request

2025-02-07 Thread Steffen Schwalm
While going through the feedback and issues on github, there was one bigger discussion point that we would like to bring to the mailing list. Steffen Schwalm asked for support for X.509 Certificate revocation with the Status List - in that case the Status List describing the status of an

[OAUTH-WG] Re: SD-JWT linkability

2024-12-17 Thread Steffen Schwalm
ns. Only open attachments and links from known and trusted senders. Legal requirements can only be adjudicated by legal means. The common approach in standards developments should be to enable a legal solution not to mandate it. thx ..Tom (mobile) On Mon, Dec 16, 2024, 11:14 PM Steffen

[OAUTH-WG] Re: SD-JWT linkability

2024-12-16 Thread Steffen Schwalm
In > 80% of use cases the retention period is not defined by law but defined by records manager after receiving the information from holder. So data retention won`t work. For those thinking about GDPR: Yes possible within GDPR too as GDPR does not require definition retention during collection o

[OAUTH-WG] Re: Precipitous unreviewed change

2024-12-03 Thread Steffen Schwalm
Hi Mike, as you mentioned relevant is consensus not alleged majority. Von: Michael Jones Gesendet: Dienstag, 3. Dezember 2024 16:24 An: Hannes Tschofenig ; oauth@ietf.org Betreff: [OAUTH-WG] Re: Precipitous unreviewed change Caution: This email originated from outside of the organization. Desp

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-sd-jwt-vc-06.txt

2024-11-18 Thread Steffen Schwalm
he rough consensus that is missing - that's why I pointed to the two threads of discussions - and not to ignore the usual IETF processes. Am 13.11.24 um 22:34 schrieb Steffen Schwalm: great work! Looking at [1] and [2] there`s obviously no consensus – which implies a breach o

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-sd-jwt-vc-06.txt

2024-11-18 Thread Steffen Schwalm
ut they are wrong according to your own rules. We would not have to waste our time if the editors of SD-JWT VC draft would follow IETF Rules and keep the agreements they made with internal and external parties. Best Steffen Von: Brian Campbell Gesendet: Montag, 18. November 2024 12:51 An: S

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-sd-jwt-vc-06.txt

2024-11-18 Thread Steffen Schwalm
Markus On 11/14/24 7:00 PM, Daniel Fett wrote: Steffen, I am surprised and somewhat startled by the tone in your message. My message to this list was clearly intended to find the rough consensus that is missing - that's why I pointed to the two threads of discussions - and not to igno

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-sd-jwt-vc-06.txt

2024-11-18 Thread Steffen Schwalm
ge to this list was clearly intended to find the rough consensus that is missing - that's why I pointed to the two threads of discussions - and not to ignore the usual IETF processes. Am 13.11.24 um 22:34 schrieb Steffen Schwalm: great work! Looking at [1] and [2] there`s obviously no consen

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-sd-jwt-vc-06.txt

2024-11-14 Thread Steffen Schwalm
d not to ignore the usual IETF processes. Am 13.11.24 um 22:34 schrieb Steffen Schwalm: great work! Looking at [1] and [2] there`s obviously no consensus – which implies a breach of Sections 1.2, 5 and 9.2 of the IETF Directives on Internet Standards Process. These are strong accusations. I presume you&

[OAUTH-WG] Re: I-D Action: draft-ietf-oauth-sd-jwt-vc-06.txt

2024-11-13 Thread Steffen Schwalm
Hi Daniel, great work! Looking at [1] and [2] there`s obviously no consensus – which implies a breach of Sections 1.2, 5 and 9.2 of the IETF Directives on Internet Standards Process. An assumption is great but not sufficient as in any standardization body. According to IETF rules the consensus

[OAUTH-WG] Re: [lamps] Revocation and OAuth

2024-05-22 Thread Steffen Schwalm
@Christian: If you want to replace certificates with JWT/CWT (in case using it for QEAA acc. Art. 45b ff.) it might be meaningful regarding validation (and so revocation subjects) to have look into current development of ETSI EN 319 102 (last version 03/24) which defines current signature valida