Re: [OAUTH-WG] Call for adoption - SD-JWT

Torsten Lodderstedt <torsten@lodderstedt.net> Tue, 02 August 2022 10:02 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FEF0C15C52C for <oauth@ietfa.amsl.com>; Tue, 2 Aug 2022 03:02:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lodderstedt.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hUFtRGeeU8F5 for <oauth@ietfa.amsl.com>; Tue, 2 Aug 2022 03:02:53 -0700 (PDT)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 081B7C15A729 for <oauth@ietf.org>; Tue, 2 Aug 2022 03:02:53 -0700 (PDT)
Received: by mail-ed1-x52a.google.com with SMTP id p5so16910710edi.12 for <oauth@ietf.org>; Tue, 02 Aug 2022 03:02:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lodderstedt.net; s=google; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=Lj2hLvICBaFYttyqX0167RNNrMxs52vyLIrjOjAtN6s=; b=qJy7goql+gEKwR24xQqYRUh2EAP2DEinbTeei+8k+jPGUsur9d0AaSpGOs9m5m060o CUoD/ktsSxLdLeXJeJPPtt3jtlA7ODfXDmnY0pVJxorXyikknYUgamhAfHFuAvJMaDl+ tke8Fi9Pm0Ax2m4Z5/a3xXvpqA02EDBkrBgKAv1DocQzHmN34Om7DbP1aP7touzYLj2x Rjh8oGKN04PQCEKiQ88S8COQeqxtVqiVgFtUpe47HK9Jns4OUseLut9EEF4RA/5Vs1bY C0b7rEsr8bGhMk8ABCz7iBQRk/gVycvevImNLHNDsCWAe2K6HAQD4E6KZJ6OBGI5CVXy 85aw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=Lj2hLvICBaFYttyqX0167RNNrMxs52vyLIrjOjAtN6s=; b=PS87O0t8ipjLPzg33HhlsECiEeB4nh/qyUBNfuJPSOmqTwBbzXJnkY0Tv7BgALwSsl jyNLcUo6EWdNL3K3jOFK1x3pRbbJV59awJmvxSCQOvRMrGvZneMihBcxy62P8jAaG9Rg +vtzE7WeZXc68yO1i23pURuqfk5Nj+uhwg8FncfTdGrMJhLIYDBaOOj5Mj2ozTrSdKUX /gvMAF+rb9naXmleVnJIN7gaqfNzj+BpD/aYCkmU3fAb2Tj/LvMAWd5KpyK15hXKtaB9 ulzJVLFg+TyD4PIgK2L1XD7/eWAZZkzALjqWLJFIEnVA7QLYV/hFJFOKpo2YZ5rcP4hB Ktsw==
X-Gm-Message-State: AJIora9h9pAMwmVbAE1mOES/tRWi4s05OKigDygp2RlzRcO8n0VobdkF /rzdJzv2k4dRPofMvdKzhcEBpw==
X-Google-Smtp-Source: AGRyM1uEOAiJI0/6MA6YcnsB45Ei4kwMR1VcgSr0L+FqfxVb6rJplia9fYFJLWYUdzuZhB/KBGoRcA==
X-Received: by 2002:a05:6402:529a:b0:43b:b8e4:fca5 with SMTP id en26-20020a056402529a00b0043bb8e4fca5mr20183155edb.344.1659434571575; Tue, 02 Aug 2022 03:02:51 -0700 (PDT)
Received: from smtpclient.apple ([31.45.223.2]) by smtp.gmail.com with ESMTPSA id l4-20020a170906078400b00730453877b1sm4072450ejc.217.2022.08.02.03.02.50 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 02 Aug 2022 03:02:51 -0700 (PDT)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <C1C33532-850E-44CF-AFB8-5AF1438F96F1@lodderstedt.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_37FF327E-A50D-4F08-9F6A-5309F4B802E4"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Date: Tue, 02 Aug 2022 12:02:48 +0200
In-Reply-To: <7a4eaa5d-ec59-e13d-2d36-f8bcac48c0f2@verifiablecredentials.info>
Cc: oauth@ietf.org
To: David Chadwick <d.w.chadwick@verifiablecredentials.info>
References: <CAGBSGjoAFr7E=m6i8qv8XWjkraApPxMsDxqWwyNRU5K51Gbq9Q@mail.gmail.com> <6F68CD19-E97D-4584-A12B-F5710A06C4C1@forgerock.com> <CAJot-L1dpuTGsm=yGy03LsUOhmr3GgZvaqGMyzgUB=mt=fBuVA@mail.gmail.com> <7a4eaa5d-ec59-e13d-2d36-f8bcac48c0f2@verifiablecredentials.info>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/AK_Fm-gVwI-JQDM5i633xl24yKA>
Subject: Re: [OAUTH-WG] Call for adoption - SD-JWT
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Aug 2022 10:02:57 -0000


> Am 02.08.2022 um 11:44 schrieb David Chadwick <d.w.chadwick@verifiablecredentials.info>:
> 
> 
> 
> On 01/08/2022 18:39, Warren Parad wrote:
>> So the question is how many offline interactions are there, and what do those look like?
> This to me is the key question. If the vast majority of transactions between the user/wallet and the RP are online (which I believe that most will be), then the client/wallet/user can request a short lived credential on demand from the RS containing just the claims that the RP is requesting. The same access token should be usable for this. This also solves the pair-wise ID issue between the wallet/user and the RP, as the user's key inserted into the credential will be ephemeral.
> 
> 

That is certainly feasible and it would solve selective disclosure and unlinkability on the RP side. 

However, it comes at a price. It will tell the issuer a lot about the frequency, the time, and the claims a user uses for accessing service, degrading privacy towards issuers. 

That’s the reason I would not expect a lot of deployments to embrace this pattern. e.g. I would doubt eIDAS 2 goes that way.     
> For those (possible few) transactions in which the wallet is offline, then the wallet has to obtain the (possibly selectively disclosed) credential before it is needed. But this is already the case today with boarding passes. I load it onto my phone whilst I am online at home, and then I present it offline at the airport e.g. via a QR code. So using this model the user can go to the RS when online, obtain a short lived selectively disclosed credential that they know will be needed later (e.g. age over 18 for entering a nightclub) and then present it offline when they arrive at the nightclub.
> 
> For those (possibly even fewer) transactions in which the user is suddenly caught offline e.g. on the top of a mountain by a police officer, then I can see that the SD-JWT with blinded property names and values is a suitable solution. The user might have a few of these in their wallet, each being one-time use with a different key, that once selectively disclosed are discarded. The user/wallet can refresh the store periodically (or the wallet could do this automatically ensuring that a small number are always present). These would also need to be relatively short lived otherwise a revocation mechanism would need to be introduced (horror of horrors, especially on the top of a mountain with no access to the revocation list).
> 
> Kind regards
> 
> David
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth