Re: [arch-d] Proposed IAB program on Wholistic Human-Oriented Discussions on Identity Systems (WHODIS)

Christopher Wood <caw@heapingbits.net> Mon, 17 July 2023 16:02 UTC

Return-Path: <caw@heapingbits.net>
X-Original-To: architecture-discuss@ietfa.amsl.com
Delivered-To: architecture-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DAC3CC13AE26 for <architecture-discuss@ietfa.amsl.com>; Mon, 17 Jul 2023 09:02:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.785
X-Spam-Level:
X-Spam-Status: No, score=-2.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heapingbits.net header.b="P5Ej4muq"; dkim=pass (2048-bit key) header.d=messagingengine.com header.b="ppBKrR0b"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xuUtr42e3mWJ for <architecture-discuss@ietfa.amsl.com>; Mon, 17 Jul 2023 09:02:54 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C03BC1516EA for <architecture-discuss@ietf.org>; Mon, 17 Jul 2023 09:02:54 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 838FD5C00FE; Mon, 17 Jul 2023 12:02:51 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute6.internal (MEProxy); Mon, 17 Jul 2023 12:02:51 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heapingbits.net; h=cc:cc:content-transfer-encoding:content-type:content-type :date:date:from:from:in-reply-to:in-reply-to:message-id :mime-version:references:reply-to:sender:subject:subject:to:to; s=fm3; t=1689609771; x=1689696171; bh=IS+K6K2jb8uXTnA4YRaWAigfP w3P+dvH0dOyRUncaMI=; b=P5Ej4muqDESyIkhzHxy+Yzxg2Hqaz6DXHM/ht53eQ Wp4rv6C2IrOw0N3Zn33TCQ68skptuGEn/RZwScNoT3jHNaawUmA0piDtONoawQsz B/V4BKx4fRENg7/7uwdPpWHhw/nRJ/hzkB2Wd0J6CqpC1hJxalWtJIZ2XcaO8v9T xboZ55YjXjiyIPE9L7y4AcGbuS//dkpQ2McwYDLnVsjlYhsm9U/xYfr9I5OWWxs9 JHmGGup1QwlW8HeTKgU5LOCLNWZp8XLCyPJUmlRue/Sq/z9lKMASG6YzAq14HhbX yB2F8ukT7vsaxS6oC4oMFUEjGVrh9HhS6EyswR8qT6Sug==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:content-type:date:date:feedback-id:feedback-id :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:sender:subject:subject:to:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t= 1689609771; x=1689696171; bh=IS+K6K2jb8uXTnA4YRaWAigfPw3P+dvH0dO yRUncaMI=; b=ppBKrR0bZvphOEVznCyzRvp4/MNQ0a3P/QCOBf/6KzJXHsaEQpK yxXN3jeX7yKTX7c0ScMn7gX4pOJLleKSFfEsz18nDyNGhZFvDy/xEEHZML4Iv4L1 Bnnoe4N/+Ql+9X5OZyXznGOaHRmsJcji6qqlrYoO/y40HQGiJw/8WGX+Y985UOWO Po8JSq91B6xLCJyCia1uOeuebOTCczjnw0WK8+SI3qqK825JUzIrrwuasKR40nE8 L57wkV95E33XktJwn4s05naHjv9L4ZXM4iAVRGlQAmTyDG+57zWprDWEn2ovWnY/ KmBO2lImJSnFR3tqhWnBPPYFtxljPG6JWcQ==
X-ME-Sender: <xms:K2a1ZHFes3BRKsffvaVYeI_GFDT4xFk5q5_YCjXaP_GCVRgnbaaPMA> <xme:K2a1ZEXYWnkww_qLYn4mbAHF3POzkAyhaAugJz1PruswV8ihPvnSTJtyK8qxyD-oY -qps8cdFZ2PbJpqYDM>
X-ME-Received: <xmr:K2a1ZJJr-HZ6GWFtzoayLJTsa9bFhUF5fMo7ggfrTotiFO6wnyutehkQeoIacYRIksY94HuXfOXbld90UQmndgEbKCabJdxIhR7R0n7K5LJRZDR544_GXw>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedviedrgedvgdeliecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurheptggguffhjgffvefgkfhfvffosehtqh hmtdhhtdejnecuhfhrohhmpeevhhhrihhsthhophhhvghrucghohhougcuoegtrgifsehh vggrphhinhhgsghithhsrdhnvghtqeenucggtffrrghtthgvrhhnpeeileffgfffgfekfe ffuddutdffkeetteevhfdvveeltedvudefheefueffleeuvdenucevlhhushhtvghrufhi iigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegtrgifsehhvggrphhinhhgsghith hsrdhnvght
X-ME-Proxy: <xmx:K2a1ZFFl5uOtizLSdXwDvn28dj9UfqgTZj0t4od6JgzPOa3vpBFeLw> <xmx:K2a1ZNWtD-k2Vxp-p91Uel1vEDja-kCR_7NKW_i7lumK88jI4qSi7w> <xmx:K2a1ZAP-HMl9_5afuzEU0tsA0SQq435zKp9sz0G5ePv2pbQfYaHDsg> <xmx:K2a1ZOeoPAMqnWDNA8xewmagFwig3MGIeKBThip9KMZknXTOALDV0g>
Feedback-ID: i2f494406:Fastmail
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 17 Jul 2023 12:02:50 -0400 (EDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.3\))
From: Christopher Wood <caw@heapingbits.net>
In-Reply-To: <CABcZeBPOuZt9uvPzwzFmONtr9f9Baa+pZV7edXFuL+FTwqCD7g@mail.gmail.com>
Date: Mon, 17 Jul 2023 12:02:49 -0400
Cc: architecture-discuss@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <E5DC75E7-DD6C-4B70-80A2-37294B94568A@heapingbits.net>
References: <17514E09-F39D-425C-970C-BC14C70F15B9@heapingbits.net> <CABcZeBPOuZt9uvPzwzFmONtr9f9Baa+pZV7edXFuL+FTwqCD7g@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
X-Mailer: Apple Mail (2.3696.120.41.1.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/architecture-discuss/AWD9fX-r_P6_0fDKNUS06moaXLk>
Subject: Re: [arch-d] Proposed IAB program on Wholistic Human-Oriented Discussions on Identity Systems (WHODIS)
X-BeenThere: architecture-discuss@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: open discussion forum for long/wide-range architectural issues <architecture-discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/architecture-discuss/>
List-Post: <mailto:architecture-discuss@ietf.org>
List-Help: <mailto:architecture-discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/architecture-discuss>, <mailto:architecture-discuss-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jul 2023 16:02:59 -0000

Hi Ekr,

Sorry for the delayed replay, and thanks for the feedback. Please see inline below.

> On Jun 27, 2023, at 7:49 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> Hi Chris,
> 
> Thanks for sending this.
> 
> I have a few points here.
> 
> First, I'm struggling a bit with the way that this program is
> described:
> 
>    The identity ecosystems that support these use cases are
>    individually and collectively vast, including classical forms of
>    identities such as email addresses, phone numbers, and
>    certificates, to new forms of identities built on standards such as
>    OAuth [1] and Verifiable Credentials [2].
>    
> This seems to conflate two concepts:
> 
> - Identifiers such as email address and phone numbers
> - Credentials such as certificates, OAuth, and VC
> 
> To take a concrete example, certificates are a credential which can
> carry a variety of different identifiers, including email addresses,
> phone numbers, and (in the WebPKI), domain names. However, there are
> of course other types of credential which can attest to these same
> identifiers (E.g., VC) [0]. Of course, these aren't entirely
> independent concepts, but they are largely decoupled; even systems
> which tie back to cryptographic identities (e.g., blockchain-based
> systems) often try to attach some kind of human-readable attribute to
> that keying material.
> 
> For this reason, my take would be that this work ought to focus on
> credential systems, not identities.

I think you’re right in that the current text is conflating these two concepts, and we may be biting off more than we can chew. Credentials seem natural to discuss given their technical nature, whereas identifiers are more vague and ill-defined (is an IP address an identifier?). We plan to discuss this topic during the IAB Open at 117, and I think orienting it around the split between credentials and identifies will help us determine an appropriate initial scope for the program.

> Second, I think that you should probably try to focus on some subset
> of the landscape, which, as you say, is vast. As a super-rough categorization,
> you might think of identity being broken down into:
> 
> - Primary authentication via public keys, passwords, passkeys, etc.
> - Secondary (often called federated) identity systems like FedCM,
>   Google Auth, Facebook Connect (or whatever it's called now), etc.
> 
> These seem superficially similar, and of course RPs will often accept
> both (e.g., log in with your password or Google Auth), but technically
> they are quite different. I would focus on the second category and
> eschew the first.

This is an interesting take. Is your suggestion to focus on the second due to the well-defined nature of the first group?

> 
>   In working towards these goals, the program could collect important
>   use cases addressed by existing identity mechanisms, discuss
>   functional requirements (e.g., trust model, access control, support
>   for roles, etc.) essential for these use cases, and showcase how
>   existing identity mechanisms meet or exceed these requirements.
> 
> This seems to expand the scope quite a bit beyond identity. I would
> try to hit just identity first.

I think you’re right that the surface area with this list is enormous. Our thinking was that these adjacent topics provide context for the credential (and identity) mechanisms used in practice, and that context may be helpful in practice. Given that it’s optional work, I wouldn’t consider this a hard requirement for the program. It’s merely a suggestion.

Best,
Chris