[OAUTH-WG] Re: Call for adoption - PIKA

Giuseppe De Marco <demarcog83@gmail.com> Wed, 12 June 2024 11:59 UTC

Return-Path: <demarcog83@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 932B3C14F70A for <oauth@ietfa.amsl.com>; Wed, 12 Jun 2024 04:59:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.857
X-Spam-Level:
X-Spam-Status: No, score=-6.857 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OuVMHS8LK6Tx for <oauth@ietfa.amsl.com>; Wed, 12 Jun 2024 04:59:41 -0700 (PDT)
Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1758C14F6E8 for <oauth@ietf.org>; Wed, 12 Jun 2024 04:59:41 -0700 (PDT)
Received: by mail-ed1-x536.google.com with SMTP id 4fb4d7f45d1cf-57ca8e45a1bso862460a12.0 for <oauth@ietf.org>; Wed, 12 Jun 2024 04:59:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1718193579; x=1718798379; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=SkYvbfEsirgg/ucavYelhIGTQqNYz1bqUZDSMfWCcTA=; b=KIwK8z2hW8Q8E/36rMGxOg/wTB52wjDPriWXJHry9ibPqGjmiyeIXz+lDTBTE5vTVK iFnKXBSam1DoFY0EABuqznOvSkdYOyPv0POt908ZnRwCxYc+UTG6m9FfdHyVLffYMRPf qSV051z4e6j0yhB77iLZ72EKLA46oYwo2xhNK/4h+cDl1e9TU2CyZm6ZmDMMWy+JXb2K suXJuE9jw2N09V9IvkXtCH5w+F5lpSDHxcoiSdgxkFGicQ6so43oTfagz9gh2Q5PBsyw YuuR5HCbGUJ4BaMC+1RC3Htr3YfU3LZLKJ4a/dqEJ0WdIHZllTNybhhEt6r8jr72UZiC L18Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718193579; x=1718798379; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=SkYvbfEsirgg/ucavYelhIGTQqNYz1bqUZDSMfWCcTA=; b=bpKgDz0zi4Fvk0nxxJzt3SF0aQ2y8QmnIsc09aad+8R+ycM1hMXh8IFzIhVDG+5aFW XAule0X4QRUikmR+0IrTiWriev2uj1sWQEH4Vn5S2NcyrexQ9Wa+8dUMMJC/Bq4Qb4bP SxS3v0Wbiq/A9OM/FPb8D3lE1KG4oJ62WxOwbzqgEDGiNxseVAGrxBdrOd0Dfaphd4WQ FJdLbyz4E+LRGqXtCj5NQD8ByDum+QyF/w9c9Av9TEhxrxf5EoBVu1M/Sx4MkMTBdYKV WNMPXjcEdX9GNF4gT9pbSUis8PDrfkzvhNPjg4kEaj6DT2GkSeen0J5Yh58fWQaVZO2W SXuw==
X-Forwarded-Encrypted: i=1; AJvYcCWXhUB9Cm8FOi6MKMcRmqRE1RNCUY3Prb0lhZZtOz6+RrnnV1MlGlpoH7uzKa9df9IRVNt24rLqhEexDYzoKg==
X-Gm-Message-State: AOJu0YwD9AQEjNBLyX6PGjlCh8meB3zQxCjrZlMtG8Uo4cP+51XU1/n1 bCq+u8lsRTjJwiznh1Z5iaciv1hslAhnBNUZ8ponET4GkoSc6uhEfDmUm0qcEGTjZD7BQrFzeTt FDTPsKErL/lGBEFtdatpNA4BDQU4=
X-Google-Smtp-Source: AGHT+IGEJg4g8eGjVatn55lxM0xSMV23TyW5w3iV2KBIIXth93QxYA2THBr1sm7y+8AmXBPGo5tieWHEI7QraxqWvHM=
X-Received: by 2002:a50:aa96:0:b0:57c:5f89:30 with SMTP id 4fb4d7f45d1cf-57ca974f683mr1488023a12.12.1718193579103; Wed, 12 Jun 2024 04:59:39 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP9GmF4vp1uzLXK0YYZAHUDjK7RHbhEb4MCXkB7N3Oq4+w@mail.gmail.com> <CAL02cgSEt8z3zsLC6U5eqhMSHbn-+7uywZCQUrUpJ9zQwQeShQ@mail.gmail.com> <SJ0PR02MB74398B6C188C5D374B86F81BB7C72@SJ0PR02MB7439.namprd02.prod.outlook.com> <CAL02cgTMSgi-boxZAjkFc8_JrEJrGzk=LH5BnS2Earx-Ji2j9A@mail.gmail.com> <SJ0PR02MB74398BDC255CC7D533FC3149B7C72@SJ0PR02MB7439.namprd02.prod.outlook.com> <CACsn0c=TH=YyLRPaZXzd=oD1ZSm2-yvA1WxpxcMe6kLm=JwrNQ@mail.gmail.com> <CAK2Cwb6V_biszxSqxaykFDTowAD2STpzts=48=Rd_KeMie3+Ug@mail.gmail.com> <CAP_qYynE8wuvVCCBKFJai8LshMC5qY3PrNXYCOwnTq5C0gRyFQ@mail.gmail.com> <CAKoiRuaRQUL0qA6oM5v3jzjEm5an0-OK=wEoqk1u7iZmgQEuRQ@mail.gmail.com>
In-Reply-To: <CAKoiRuaRQUL0qA6oM5v3jzjEm5an0-OK=wEoqk1u7iZmgQEuRQ@mail.gmail.com>
From: Giuseppe De Marco <demarcog83@gmail.com>
Date: Wed, 12 Jun 2024 13:59:25 +0200
Message-ID: <CAP_qYy=RbZwB+36gNTBiBDdDeKrxGxmp-+1L+4UZxoakuaC1nQ@mail.gmail.com>
To: Rohan Mahy <rohan.mahy@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000f01cfa061ab01dca"
Message-ID-Hash: 4OE6TQN7M7NI6C2WSBJBY2VUBDSRYIRK
X-Message-ID-Hash: 4OE6TQN7M7NI6C2WSBJBY2VUBDSRYIRK
X-MailFrom: demarcog83@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: Call for adoption - PIKA
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/0AH1ZGAObXgLmeK9cKPUdkYKYus>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

This depends on the evaluation criteria of the verification you conduct
with a subject.

We can agree that the initial verifiable evidence that a Trust Anchor/CA
has issued a certificate for a subject is the first indication that the
subject belongs to a network/framework/shared-regulation/perimeter.

Let's consider this mailing list as a trust anchor.

We're having a productive conversation under a common trust anchor, where
the evidence that connects us is our membership in this community, under
the IETF Trust Anchor.

However, this alone is not sufficient, because you must read everything I
say and empirically evaluate if you can trust me qualitatively.

OpenID Federation allows the exchange of metadata to securely establish
interoperability and also applies policies that dynamically change this
metadata, adding qualitative evidence with trust marks.

This is the advancement I found that the X.509 based PKI was not designed
for. I use X.509 based PKI for other purposes, since in this universe
everything has its right place, and I appreciate this.

I also appreciate PIKA in a way to make this grow and get integrated with
other models that should not be kept out of the scope of the specification
if you agree and if we may have the opportunity to work together in this
field

Il giorno mer 12 giu 2024 alle ore 12:47 Rohan Mahy <rohan.mahy@gmail.com>
ha scritto:

> Giuseppe,
> Given that verifying the issuer is already done using X.509 PKI today, why
> do you object to trusting the PKI root for the same purpose (validating the
> domain name of the issuer) with the same validity period (between the
> notBefore and notAfter of the certificate)?
>
> Thanks,
> -rohan
>
> On Tue, Jun 11, 2024 at 4:44 AM Giuseppe De Marco <demarcog83@gmail.com>
> wrote:
>
>> Ciao Tom,
>>
>> Public Key Infrastructure satisfies the requirements to provide public
>> keys. Technically, using X.509 certificates represents a consolidated
>> approach.
>> Giving public keys doesn't help in establishing the trust or fully
>> proving the compliance to shared rules, that's why openid federation
>> authors insist that openid federation is not only a pki.
>>
>> TLS is not removed, we use X.509 based pki on the web, therefore also
>> using federation.
>>
>> TLS is used to establish confidentiality with an endpoint, establishing
>> trust to a subject only because it controls a private cryptographic key is
>> similar to the weakness about the bearer tokens.
>> Therefore, for instance, in advanced ecosystems and implementation is
>> required to demonstrate the proof of possession of the tokens because
>> bearers alone are not secure enough. This is more complex but required in
>> the real wold.
>>
>> The point is: what is trust, how to establish trust in the real world,
>> which are the technical layers that we should (even in a modular way) take
>> into account to achieve our goals. Do we have the same goals?
>> Don't stop working together, let's keep the conversation to achieve our
>> goals in an harmonic way.
>>
>> Il giorno mar 11 giu 2024 alle ore 06:11 Tom Jones <
>> thomasclinganjones@gmail.com> ha scritto:
>>
>>> This whole problem did not need to happen. When the federation spec was
>>> being created I asked them not to deviate unnecessarily from pki. But the
>>> very guys that are on this thread told me that they were not a pki and so
>>> there was no reason for them to follow existing rules. This is entirely a
>>> problem of there own making. So let them fix their own mistakes.
>>>
>>> thx ..Tom (mobile)
>>>
>>> On Mon, Jun 10, 2024, 8:37 PM Watson Ladd <watsonbladd@gmail.com> wrote:
>>>
>>>> On Mon, Jun 10, 2024 at 8:33 PM Michael Jones
>>>> <michael_b_jones@hotmail.com> wrote:
>>>> >
>>>> > We all know that TLS certificates are handled by platform layers used
>>>> by applications and not the applications themselves.  There is no code that
>>>> understands X.509 certificates in most applications that use TLS.  They are
>>>> not equivalent in complexity.
>>>> >
>>>> >
>>>> >
>>>> > The draft would require adding code directly understanding the
>>>> structure and fields of X.509 to applications using it.  Eliminate that,
>>>> and I’ll support adoption.
>>>>
>>>> I don't understand your proposal. An X509 certificate is the only way
>>>> to link a DNS name to a key at a given point in time as we can
>>>> leverage the Web PKI. Absent that, what do you do?
>>>>
>>>> Also, I'm not sure what you mean by platform layers. Many of them
>>>> expose a function to verify a signature with a key in an X509 cert or
>>>> verify a cert chain, even outside the context of TLS. Are there
>>>> particular ones that would have a problem you are concerned about?
>>>>
>>>> Sincerely,
>>>> Watson Ladd
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list -- oauth@ietf.org
>>>> To unsubscribe send an email to oauth-leave@ietf.org
>>>>
>>> _______________________________________________
>>> OAuth mailing list -- oauth@ietf.org
>>> To unsubscribe send an email to oauth-leave@ietf.org
>>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-leave@ietf.org
>>
>