Re: [OAUTH-WG] [SPICE] Relationship between SPICE and OAuth

hannes.tschofenig@gmx.net Fri, 03 November 2023 08:49 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFA6BC1705E2; Fri, 3 Nov 2023 01:49:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.803
X-Spam-Level:
X-Spam-Status: No, score=-2.803 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9QfVx4XKP7K9; Fri, 3 Nov 2023 01:49:39 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B1F7C1705E3; Fri, 3 Nov 2023 01:49:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=s31663417; t=1699001376; x=1699606176; i=hannes.tschofenig@gmx.net; bh=Mkoj/oYN/GS9vksFcjjHy5dpDmEV5Hjpt/THYiTh204=; h=X-UI-Sender-Class:From:To:Cc:References:In-Reply-To:Subject: Date; b=EMZ//sheQjE+GXfTBUdo4LKksDhYe79nb6oUm3b+h3gkTIRq4SfWggZW+ajyAfql W1Kt56cSrO6z4l9ERNDdARfmzdeZV2LkcxXm2huAAcrECGuTOj+ehc35y9cxZZkKY 8S3vZr6PpvZdDFpd6uPwn9x7FmhjH3xMPdnxXQ3+P9BC5IhjfjOExxn5/fGdLO2cq Q9z+nAcfNn7R+VdJQWGHkJMpVd2eIQawdzQ5jdODEZCpec+j7CoOrfgkegBe+6f9n WGpzCm3m7mrK9EyRmstGvf8U+Ky7/BVMJyPRPrJXfuhghX3Q0SIDp3XIP6u29w60J HgbwinPWirYvNVKVAA==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from Surface ([89.144.208.10]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MIdeX-1rB9fh0Ruv-00EaHx; Fri, 03 Nov 2023 09:49:36 +0100
From: hannes.tschofenig@gmx.net
To: 'Denis' <denis.ietf@free.fr>
Cc: spice@ietf.org, 'oauth' <oauth@ietf.org>
References: <144ae5fd-92ef-474e-bd4b-7c7e3abfc78e@gmx.net> <3b7b2292-02bb-4ac3-adf0-7e1edf25eb99@Spark> <1a09e91a-12fd-5c47-ad49-88e040a41383@free.fr>
In-Reply-To: <1a09e91a-12fd-5c47-ad49-88e040a41383@free.fr>
Date: Fri, 03 Nov 2023 09:49:36 +0100
Message-ID: <024401da0e32$acf08b10$06d1a130$@gmx.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0245_01DA0E3B.0EB73D00"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH96UtTHBADqCZscc14ixq0x5XxuwMYxQp+AXhtoEav/Ah3AA==
Content-Language: de-at
X-Provags-ID: V03:K1:2kobG01wXHSwt8fv0Xlm9wyGURn2MCQN2MpQUtljcuODGYCIlHL wT12ShZep2y65E7N3244apGfPJtw3OqCeUcgULCE5tr5QbKCx27hnRXxsDO3pRiP9kRVPcf /zK6If9lNyPTLhNjX16UXdFpy+ipn+ASyLqzzwlHYSZhEGlOeIP6J79HIKS+bmn+8OasIJT gQcxX22R8t8aabwvOAG/Q==
UI-OutboundReport: notjunk:1;M01:P0:JNufXAT3N00=;O00BnR+1mHvVChRPUDgtCasM5G+ bxOcdwDHFEaUfdykonpwG//o0MdBj6d2bd2dkJp91yzBs89vtOmERsjpaHGvnJNH0floLKUr6 B3rmX+5u3klVoGSPiZIMyyKQWvw+nCfeiVHaQzhBNBoRoOdQCuyHFmGkiDCZi88lPAfrSetJ+ 07vioT5OUDgFefRTgASdJyBuZ+Um3IJny/rusZpB84qHiU9txygFc8sWIk+rrfcnxbamqzD9x yJwuXHR+H6wZ2Fx4YLwfFYDmMOpTNJPvUINu9mEvvuGQSxgWYT041j/UM5JcE+NeVWruIy49R 5WL+ANhhhnMzqAZK2bOag/Kk/+kHWAtrlroNRiRhtiWCuEZHnhPBaCObQbQLbSVUw5leNuEA5 UE4BkgKOfkKFeQp39a0Rpu+wTlkECB7v9lM9NP05xH1uybOzyZvIZhmE9uHULur6vGjj64yQJ OURWDd5U95DhVQoaMDh/wB3YmztYQvjSH47POE1cezFiJfNOeqUhHccryZvEJshFwTdGKq4PO o8raR3+AzhBgaLZM6UDNs4A9E2vNtEA2ToGXQPkdI1gz6HTWxktOo/gQbbXDk+3uiM36hCNDD LGCGoMQY89qx2F3E9ErWxerB3FhyqnCC8j7u2oT6QmbxWpVmdatHvNLJRBJ7O0V9SE1jIAo9E jKZd4PZEQJ7srCsiBuzuXmEZ1Hfb4MCPDqiDFU+vfNbng/J9+taKHQqU2YDtFwjnRi57uKyfQ Y3n2PiHM/ozWwXueFFk2blTE0FCE6YtoZ8b1AXxmv57oVGecyQqC0ecBBUJj6pO737S1FTYJC DiH2RSNlJ4K4crJ3Hc5CzApJS3ZFBasW+ANpr/AXZJpWg88SMv5ODh0VA+/s3X8MNoMhg6Pnt D/z0ec3WC6fdJjQzwLHjZxyrNquBrPx5ICs9NLlLta9hhQu8TcOenFWnPK7Nu1J34n8xWYk70 M6LcVGrsgfpZMejKRmffX1tM/qM=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/2ZjUZ9eJ3ZRUkbuf50MO1V9rjKI>
Subject: Re: [OAUTH-WG] [SPICE] Relationship between SPICE and OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Nov 2023 08:49:43 -0000

Hi Denis, 

 

It is true that the current OAuth charter does not address the three party model.

 

This is why Rifaat and I have put an agenda item to the OAuth meeting to discuss a charter update. We will talk about this new charter on Tuesday after the WIMSE and the SPICE BOFs took place.

 

Ciao

Hannes

 

From: Denis <denis.ietf@free.fr> 
Sent: Mittwoch, 1. November 2023 19:18
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Cc: spice@ietf.org; oauth <oauth@ietf.org>
Subject: Re: [SPICE] [OAUTH-WG] Relationship between SPICE and OAuth

 

Hi Hannes,

 

The current charter of the OAuth WG is available at: https://datatracker.ietf.org/wg/oauth/about/

The major problem is that both this charter and the OAuth 2.1 (or OAuth 2.0) authorization framework 
cannot currently address the three roles model with an Holder, an Issuer and Verifier. In the three roles model, 
there is no concept of a "resource owner ", nor of a "resource owner's consent".

Bridging the architectural narrative used in the core OAuth framework (AS, RS, RO) and in the three roles model 
(Holder, Issuer, Verifier) would not be appropriate.

As Justin mentioned in https://oauth.net/articles/authentication/:

      "Remember, since OAuth is a delegation protocol, this is fundamental to its design".
      "In OAuth, the token is designed to be opaque to the client, but in the context of a user authentication, 
       the client needs to be able to derive some information from the token".

The current draft from "The OAuth 2.1 Authorization Framework" states in section 1.4 
(https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-09.html#name-access-token):

       "An access token is a string representing an authorization issued to the client. 
        The string is considered opaque to the client, even if it has a structure".

When using selective disclosure, the access token cannot remain opaque to the client since it needs to be opened and modified by the client. 
"Selective disclosure" is not a requirement: it is one mechanism that allows to support the privacy principle of "collection limitation", 
i.e., limiting the collection of end-users attributes to that which is strictly necessary for the specified purpose(s).

However, "selectively disclosable claims" is only the tip of the "three roles model" iceberg, since other disclosure mechanisms, e.g., based on zero knowledge techniques 
can be used and several privacy and security properties need to be considered. With some models, some properties can be supported, while with other models they can't.

The OAuth 2.0/2.1 framework cannot apply to a three roles model with an Holder, an Issuer and Verifier. Rather than working with document increments 
based on the OAuth 2.0/2.1 framework, a re-chartering the OAuth working group would be necessary so that a framework tailored to the vocabulary 
of three roles model could then be developed. 

It should finally be noticed that the acronym of this WG, "OAuth", is a short for "Open Authorization". It is questionable whether that acronym or its meaning 
would still be appropriate to address the three roles model which does not fit into the OAuth 2.0/2.1 framework.

Note: On the SPICE BoF mailing list, I raised an issue and proposed an alternative strawman proposal for the spice-charter 
(https://github.com/transmute-industries/ietf-spice-charter/issues/3). I also sent several emails requesting changes to the wording of the proposed charter. 
Please note that at this time, I don't agree with the current wording of the SPICE BoF charter.




Denis

 

Hi Hannes, 

Am 1. Nov. 2023, 12:21 +0100 schrieb Hannes Tschofenig  <mailto:hannes.tschofenig@gmx.net> <hannes.tschofenig@gmx.net>:

Hi all,

I am a bit puzzled by the response Pam and I received when putting the agenda for the SPICE BOF together. It appears that most people have not paid attention to the discussions during the last few months.

Let me try to get you up to speed. So, here is my summary.

The OAuth working group has seen a lot of interest in the context of the SD-JWT/VC work and there have been complaints about the three WG sessions we scheduled at the last IETF meeting. (FWIW neither Rifaat nor I understood why we received these complaints given that people asked us for more slots. But that's another story...)

The SD-JWT/VC work is architecturally different to the classical OAuth (which is not a problem) but raises questions about the scope of the work done in the OAuth working group, as defined by the charter. The charter of a group is a "contract" with the steering committee (IESG) about the work we are supposed to be doing. There is the expectation that the work described in the charter and in the milestones somehow matches the work the group is doing (at least to some approximation). See also the mail from Roman to the OAuth list for the type of questions that surfaced: https://mailarchive.ietf.org/arch/msg/oauth/a_MEz2SqU7JYEw3gKxKzSrRlQFA/
In time for the Prague IETF meeting a BOF request (with the shiny name SPICE, see https://datatracker.ietf.org/doc/bofreq-prorock-secure-patterns-for-internet-credentials-spice/) was submitted. It was subsequently approved by the IESG. SPICE aims to cover the scope of the SD-JWT/VC work (plus work on defining the CWT-based counterparts) -- my rough summary; details are here: https://github.com/transmute-industries/ietf-spice-charter/blob/main/charter.md

This BOF request again raised questions about the scope and the relationship with OAuth, see Roman's note here: https://mailarchive.ietf.org/arch/msg/spice/Aoe86A0x6bezllwx17Xd5TOQ3Pc/
Now, we are in the final stages of preparing the BOF for the Prague IETF and in the agenda preparation we repeately get asked the same question:

"Has the transfer of some of the OAuth documents already been agreed?"

The answer is "no". Nothing has been agreed. The purpose of the BOF is to find this agreement.

So, if you have an opinion whether some of the OAuth documents (in particular draft-ietf-oauth-sd-jwt-vc, draft-ietf-oauth-selective-disclosure-jwt, draft-ietf-oauth-status-list) should move to a new working group then you should speak up **now**.

Have a missed a posting on this list where you have started a discussion with the WG of whether the drafts shall be moved into SPICE now? Otherwise I’m wondering about the tone of your post. It’s the WG that needs to decide on this topic, right? It’s not up to the WG chairs to do so. 


The SPICE BOF (and the WIMSE BOF) will happen on Tuesday next week. The first OAuth WG session happens shortly afterwards (also on Tuesday). The outcome of the BOF(s) will guide us in our discussion about re-chartering the OAuth working group (which is an item on the OAuth agenda, see https://datatracker.ietf.org/meeting/118/materials/agenda-118-oauth-03).

Rifaat, Pam and I are mediators in this process and therefore we rely on your input. Since you have to do the work, you should think about where you want to do it.

Ciao
Hannes

PS: A process-related note. If you are author of a working group document you are working for the group. With the transition from an individual document to a working group document you have relinquished control to the group. While your opinion is important, it has the same weight as the opinion of any other working group participant. The theme is "We reject: kings, presidents, and voting. We believe in: rough consensus and running code".

Absolutely. So let’s have a discussion in the WG. 

best regards,
Torsten. 

_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org> 
https://www.ietf.org/mailman/listinfo/oauth