[OAUTH-WG] Call for adoption - PIKA

2024-06-10 Thread Rifaat Shekh-Yusef
All, This is an official call for adoption for the *Proof of Issuer Key Authority (PIKA)* draft: https://datatracker.ietf.org/doc/draft-barnes-oauth-pika/ Please, reply *on the mailing list* and let us know if you are in favor or against adopting this draft as WG document, by *June 24th*. Regard

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Michael Jones
While I'm generally supportive of the goals of this draft, I have issues with the mechanisms proposed. Therefore, I believe that more working group discussion is needed before adoption. If I were to do something along these lines, I would not use "x5c". Other than for TLS certificates, the OA

[OAUTH-WG] Re: [media-types] Re: Request for registering media types and structured suffixes defined by W3C VCWG candidate recommendations

2024-06-10 Thread Orie Steele
[ as an individual ] +sd-jwt is requested to be registered in this document: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-selective-disclosure-jwt-08#name-structured-syntax-suffix-re +cwt is requested to registered in this document: https://datatracker.ietf.org/doc/html/draft-ietf-rat

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Richard Barnes
Hi Mike, The intent here is to follow exactly the same security model as current HTTPS-based OP key discovery mechanisms, e.g., OpenID Connect Discovery. With those mechanisms: 1. The only way the issuer is authenticated is via a certificate presented in HTTPS. 2. The only aspect of the URL that

[OAUTH-WG] Fwd: Help with call for volunteers

2024-06-10 Thread Rifaat Shekh-Yusef
Please, consider volunteering for 2024 NomCom to help with selecting the next round of IETF leaders. Regards, Rifaat --- The IETF tools development team identified an error in the interface between the IETF registration system and the datatracker that mistakenly marked people as volunte

[OAUTH-WG] Re: OAuth Digital Credential Status Attestations

2024-06-10 Thread Giuseppe De Marco
Hello Everybody, OAuth Status Assertions replaces OAuth Status Attestations and it is published here: https://datatracker.ietf.org/doc/draft-demarco-oauth-status-assertions/ Therefore here its html preview: https://www.ietf.org/archive/id/draft-demarco-oauth-status-assertions-00.html Compared to

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Giuseppe De Marco
Hi, I appreciate the introduction of PIKA, which demonstrates a commitment to addressing current challenges. However, I have identified some key areas of concern that need attention: 1. The current documentation lacks clarity regarding the number and scope of cryptographic keys, particularly in t

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Richard Barnes
Hi Giuseppe, To be blunt, solving the use cases we're talking about with OpenID Federation is like doing surgery with a chainsaw. You might achieve the intended goal, but the results will be messy. The trust model we are addressing is one that already exists: A JWT is issued by an issuer identif

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Richard Barnes
In case it's not clear from other messages in this thread: I think this draft should be adopted. It solves several pressing use cases, with the minimal amount of complexity needed. --Richard On Mon, Jun 10, 2024 at 7:47 AM Rifaat Shekh-Yusef wrote: > All, > > This is an official call for adopt

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Michael Jones
As both I and Giuseppe pointed out, the requirement for applications to use and understand X.509 certificates means that the draft is way beyond the minimum complexity needed. Eliminate application-level X.509 (which is an anachronism that OAuth and JOSE have moved away from), and I’ll support

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Richard Barnes
The applications we're talking about are **already** doing X.509 when they make HTTPS connections. It's not a new requirement. The only thing we're doing is using the certificate for JWT instead of HTTPS. --RLB On Mon, Jun 10, 2024 at 11:15 PM Michael Jones wrote: > As both I and Giuseppe poi

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Michael Jones
We all know that TLS certificates are handled by platform layers used by applications and not the applications themselves. There is no code that understands X.509 certificates in most applications that use TLS. They are not equivalent in complexity. The draft would require adding code directl

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Watson Ladd
On Mon, Jun 10, 2024 at 8:33 PM Michael Jones wrote: > > We all know that TLS certificates are handled by platform layers used by > applications and not the applications themselves. There is no code that > understands X.509 certificates in most applications that use TLS. They are > not equiva

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Tom Jones
This whole problem did not need to happen. When the federation spec was being created I asked them not to deviate unnecessarily from pki. But the very guys that are on this thread told me that they were not a pki and so there was no reason for them to follow existing rules. This is entirely a probl

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Michael Jones
Watson, you wrote "An X509 certificate is the only way to link a DNS name to a key at a given point in time". However, that's not true. For over a dozen years, OpenID Connect has used a .well-known endpoint rooted at the issuer URL from which keys are retrieved (using the jwks_uri parameter) t

[OAUTH-WG] Re: Call for adoption - PIKA

2024-06-10 Thread Watson Ladd
On Mon, Jun 10, 2024, 9:33 PM Michael Jones wrote: > > Watson, you wrote "An X509 certificate is the only way to link a DNS name to > a key at a given point in time". However, that's not true. For over a dozen > years, OpenID Connect has used a .well-known endpoint rooted at the issuer > URL