WG Action: Formed Secure Patterns for Internet CrEdentials (spice)

The IESG <iesg-secretary@ietf.org> Fri, 14 June 2024 17:25 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D8112C15199D; Fri, 14 Jun 2024 10:25:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Action: Formed Secure Patterns for Internet CrEdentials (spice)
X-Test-IDTracker: no
X-IETF-IDTracker: 12.15.0
Auto-Submitted: auto-generated
Precedence: bulk
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Message-ID: <171838592485.55934.7972092515017898136@ietfa.amsl.com>
Date: Fri, 14 Jun 2024 10:25:24 -0700
Message-ID-Hash: BSTX3RUA2Q6535T4GR6JNKI7TU7WUV2Z
X-Message-ID-Hash: BSTX3RUA2Q6535T4GR6JNKI7TU7WUV2Z
X-MailFrom: iesg-secretary@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ietf-announce.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: The IESG <iesg@ietf.org>, spice-chairs@ietf.org, spice@ietf.org
X-Mailman-Version: 3.3.9rc4
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-announce/kUs2xQoJ6_ZhNwKY5Gr1oV0Kvlw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Owner: <mailto:ietf-announce-owner@ietf.org>
List-Post: <mailto:ietf-announce@ietf.org>
List-Subscribe: <mailto:ietf-announce-join@ietf.org>
List-Unsubscribe: <mailto:ietf-announce-leave@ietf.org>

A new IETF WG has been formed in the Security Area. For additional
information, please contact the Area Directors or the WG Chairs.

Secure Patterns for Internet CrEdentials (spice)
-----------------------------------------------------------------------
Current status: BOF WG

Chairs:
  Martin Thomson <mt@lowentropy.net>
  Heather Flanagan <hlflanagan@gmail.com>

Assigned Area Director:
  Paul Wouters <paul.wouters@aiven.io>

Security Area Directors:
  Paul Wouters <paul.wouters@aiven.io>
  Deb Cooley <debcooley1@gmail.com>

Mailing list:
  Address: spice@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/spice
  Archive: https://mailarchive.ietf.org/arch/browse/spice/

Group page: https://datatracker.ietf.org/group/spice/

Charter: https://datatracker.ietf.org/doc/charter-ietf-spice/

# Introduction

A digital credential expresses claims about a subject and links them with
cryptographic keys. Some sets of claim names have already been defined by the
IETF and other standards development groups (e.g., OpenID Foundation).

Digital credentials typically involve at least three entities: issuer,
holder, and verifier. An issuer constructs and secures a digital credential
for a holder. Holders may be willing either to partially disclose some values
of their attributes or to demonstrate some properties about their attributes
without disclosing their values. Holders disclose credentials, attributes, or
proofs regarding attributes in what is called a "digital presentation" to a
verifier.

Some holders may wish to carry more than one digital credential. These
credentials, together with associated key material, can be stored in an
identity digital wallet.

# Goal

The SPICE WG will analyze existing and emerging IETF technologies and address
any remaining gaps to facilitate their application in digital credentials and
presentations.

    - The JOSE WG is currently standardizing a token format for unlinkability
    and selective disclosure as specified in JWP/CWP
    (draft-ietf-jose-json-web-proof). The SPICE WG will profile these token
    formats for application in digital credentials.

    - The OAUTH WG is currently standardizing a token format for
    unlinkability and selective disclosure in the form of SD-JWT/SD-JWT-VC
    (draft-ietf-oauth-selective-disclosure-jwt and
    draft-ietf-oauth-sd-jwt-vc). The SPICE WG will define SD-CWT/SD-CWT-VC,
    which are analogous to these JWT-based tokens, but based on CWT.

The SPICE WG will coordinate with RATS, OAuth, JOSE, COSE, and SCITT working
groups that are working on documents pertinent to the identity and credential
space. The SPICE WG will build upon existing cryptographic primitives and
will not create new cryptographic primitives.

The SPICE WG will develop digital credential profiles that support various
use cases. Requirements for proposed standards in the program of work will be
established in coordination with the aforementioned working groups. The
profiles developed by the SPICE WG will enable digital credentials to
leverage existing IETF technologies.

Privacy by design, confidentiality, and consent will be considered, and
implementation guidance will be given for each proposed standard in the
program of work.

Privacy and security considerations related to the use of confidential
computing, remote attestation, trusted execution environments (TEE), and
hardware security modules (HSM) on digital credentials will be developed in
coordination with relevant IETF WGs (e.g., TEEP) and incorporate feedback
from experts on the mailing list.

Privacy and security considerations regarding redaction, linkability and
selective disclosure will be developed for proposed standards in the program
of work.

SPICE will be inspired by the conceptual data model of the W3C VC but will
not work on the Resource Description Framework (RDF) data models.

# Out of Scope

    - General Key discovery is out of scope for this WG. There are several
    mechanisms for distributing or discovering key material (e.g.,
    https://openid.net/specs/openid-connect-discovery-1_0.html)

# Program of Work

    - An informational Architecture that defines the terminology (e.g.,
    Issuer, Holder, Verifier, Claims, Credentials, Presentations) and the
    essential communication patterns between roles, such as credential
    issuance, where an issuer delivers a credential to a holder, and
    presentation, where a holder delivers a presentation to a verifier.

    - A Proposed Standard document defining SD-CWT, a profile of CWT inspired
    by SD-JWT (from OAuth) that enables digital credentials with
    unlinkability and selective disclosure.

    - A Proposed Standard Metadata & Capability Discovery protocol will be
    developed for JWT, CWT, SD-JWT, SD-CWT, CWP and JWP using HTTPS/CoAP.
    This protocol, intended for CBOR-based digital credentials will enable
    the three roles —issuers, holders and verifiers— to discover supported
    capabilities, protocols, and formats for keys, claims, credential types
    and proofs. The design will be inspired by the OAuth "vc-jwt-issuer"
    metadata work (draft-ietf-oauth-sd-jwt-vc), which supports ecosystems
    using JSON serialization.

Milestones: