Re: [Id-event] Repeat WG last call: Subject Identifiers

Yaron Sheffer <yaronf.ietf@gmail.com> Sun, 20 March 2022 15:13 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: id-event@ietfa.amsl.com
Delivered-To: id-event@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4399A3A0D51 for <id-event@ietfa.amsl.com>; Sun, 20 Mar 2022 08:13:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K5kpZK_r6QVr for <id-event@ietfa.amsl.com>; Sun, 20 Mar 2022 08:13:32 -0700 (PDT)
Received: from mail-wm1-x329.google.com (mail-wm1-x329.google.com [IPv6:2a00:1450:4864:20::329]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFE5A3A0A1A for <id-event@ietf.org>; Sun, 20 Mar 2022 08:13:31 -0700 (PDT)
Received: by mail-wm1-x329.google.com with SMTP id h189so120628wmh.3 for <id-event@ietf.org>; Sun, 20 Mar 2022 08:13:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=user-agent:date:subject:from:to:message-id:thread-topic:references :in-reply-to:mime-version; bh=vGNkcIKQm/GALqGZk0W71Q5x/ZbAQY1xd1ujNmG+YK8=; b=IsKhkq8N8KWZtbI5+mgDuNgZBo+RUj1vWV8ShiLm/r9Zg1k9t2Darp9xW+ntdtLVHO eyXGfGZwZOGB5+7Sq/lUmVVSalJbEHg0wBAP2fxDIQH6nWzLQANl0+6xXKy5aNf8JoZd hI0LsozoSsMd7+7F5DS9M+VAnHJdu2F1uUEvw/XQ+9gd45oypjvgRvielpy6zL4eG8E7 RSP5haCjGVn0AdUt7U1Rb6VVMa2aZif1774GxBC59bstrufQemQqT3JWM2wI4skXfBon ejXg+Dz9M0A6vYxYnHCYYzpsvKumDJ1Jl3ZrF4JKxR02v+Dw9q2hbScZo0fQgBGHmxPd cIJg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:user-agent:date:subject:from:to:message-id :thread-topic:references:in-reply-to:mime-version; bh=vGNkcIKQm/GALqGZk0W71Q5x/ZbAQY1xd1ujNmG+YK8=; b=JdpPAdaSAL+vVkkO2O3pKi/B/ahE0l7h6Rf7D6Clx+/1EfiAUfb6BhUL9DJCp97XbX zIzWYD53QlAKpVktwSJQpbuwqGOHXKLamr13+Xb6vRCP6MzNfKeMzIawgHmV9aSXRf2t 0CB1MycksMbUBxTTLSnNXJ4jpCUZZoiGmNM/iotQkqYKj5pkdbcva/k552KayeRzLY9K kPD5WsTrK9bVFbbwG65c2CgGnreMPF6jk/0O+Xy7vxkUTOXgXqvjaLPBU/WWHZMZ8vuz p+DHk6tbgSE0mvi1yQAoqtZ7C7zJZwukKER73epfe0wV2ukbigHc9D0hu6K7vEiSNi7C nHrA==
X-Gm-Message-State: AOAM5319kn9vHfrNbfXWMLdZDbTlrh2SZKpDNNJgPu6coNDRkrXMitZ3 ITm19u6n5l5d6W2L8VVnBwbqqroxxAg=
X-Google-Smtp-Source: ABdhPJxhTAez932CZCrHtUlBBhZ/UTN68fE7nRlGAWNCOMxO0lqwoibMTLPGHW5dp1FnWAy+GYmHyA==
X-Received: by 2002:a1c:7518:0:b0:381:c77:ceec with SMTP id o24-20020a1c7518000000b003810c77ceecmr16060699wmc.57.1647789209987; Sun, 20 Mar 2022 08:13:29 -0700 (PDT)
Received: from [192.168.68.104] ([77.125.223.117]) by smtp.gmail.com with ESMTPSA id o11-20020adf9d4b000000b001f0077ea337sm11094700wre.22.2022.03.20.08.13.28 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 20 Mar 2022 08:13:29 -0700 (PDT)
User-Agent: Microsoft-MacOutlook/16.59.22031300
Date: Sun, 20 Mar 2022 17:13:27 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>, "id-event@ietf.org" <id-event@ietf.org>
Message-ID: <ACB59B39-692D-4BF7-BCF3-42C6175C7387@gmail.com>
Thread-Topic: Repeat WG last call: Subject Identifiers
References: <53DED9E9-1782-4ADA-8996-7BFF01393702@gmail.com> <SJ0PR00MB1005F42F891BDF5C32DA6B15F5159@SJ0PR00MB1005.namprd00.prod.outlook.com>
In-Reply-To: <SJ0PR00MB1005F42F891BDF5C32DA6B15F5159@SJ0PR00MB1005.namprd00.prod.outlook.com>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3730641208_3515115164"
Archived-At: <https://mailarchive.ietf.org/arch/msg/id-event/H6VulwrvlAa4FlJ8vfln-khaeGM>
Subject: Re: [Id-event] Repeat WG last call: Subject Identifiers
X-BeenThere: id-event@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "A mailing list to discuss the potential solution for a common identity event messaging format and distribution system." <id-event.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/id-event>, <mailto:id-event-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/id-event/>
List-Post: <mailto:id-event@ietf.org>
List-Help: <mailto:id-event-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/id-event>, <mailto:id-event-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Mar 2022 15:13:38 -0000

(Hats off)

 

Hi Mike,

 

To your first point, this is not a security protocol. Rather it is a definition of a security-critical part of potentially several security protocols. As such, protocols can and should each define the degree of extensibility that works for them. But I disagree with your assertion that a generic identifier type should be extensible just because the JSON format has great support for extensibility. If needed, protocols can define extensibility points *outside* the subject identifier.

 

To my understanding, your proposal “formats should be allowed to define that their elements are extensible” is addressed by the preceding paragraph, albeit not with full unrestricted extensibility:

 

An Identifier Format MAY describe more members than are strictly necessary to identify a subject, and MAY describe conditions under which those members are required, optional, or prohibited.  

 

Thanks,

                Yaron

 

From: Mike Jones <Michael.Jones@microsoft.com>
Date: Sunday, March 20, 2022 at 15:58
To: Yaron Sheffer <yaronf.ietf@gmail.com>, "id-event@ietf.org" <id-event@ietf.org>
Subject: RE: Repeat WG last call: Subject Identifiers

 

I support publication of this draft following a few revisions.  I’d like comments below to be addressed first.

 

NORMATIVE

 

Section 3 (Subject Identifiers) says “A Subject Identifier MUST NOT contain any members prohibited or not described by its Identifier Format, and MUST contain all members required by its Identifier Format.”  This is not normal JSON usage; normal JSON usage would allow additional members to be present and say that they must be ignored if not understood.  We should consider making this change.  At the very least, formats should be allowed to define that their elements are extensible.

 

Section 3.2.3 defines a DID URL format.  There’s nothing special here about a DID URLs that would make them different than other URLs.  Please revise this section to instead define either a “url” or “uri” format.  It would be fine to say that DID URLs are one kind of URL or URI that could be used, just as https URLs would be.  That would be more general and would still allow the use of DID URLs as subject identifiers.

 

EDITORIAL

 

“general purpose” -> “general-purpose”

 

RFC 7159 is listed twice in the Definitions section.

 

It’s customary to acknowledge individual reviewers of the specification by name.  Please do so.

 

                                                       Best wishes,

                                                       -- Mike

 

From: Id-event <id-event-bounces@ietf.org> On Behalf Of Yaron Sheffer
Sent: Wednesday, March 9, 2022 2:54 PM
To: id-event@ietf.org
Subject: [Id-event] Repeat WG last call: Subject Identifiers

 

This is to start a repeat working group last call for draft-ietf-secevent-subject-identifiers [1]. Please respond to the list with your comments, even if they only amount to “I read the draft and it’s fine”.

 

We solicit and encourage WG feedback. However given the age of the draft and overall low working group energy, the current plan is to progress the draft to the IESG by default, unless any major issues are raised.

 

As you review the document, please note that two versions (-09 and -10) were published recently. 

 

The LC will be open until March 20.

 

Thanks,

                Yaron

 

[1] https://datatracker.ietf.org/doc/draft-ietf-secevent-subject-identifiers/