[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

Pierce Gorman <Pierce.Gorman@numeracle.com> Thu, 26 December 2024 18:08 UTC

Return-Path: <Pierce.Gorman@numeracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A43CC151065 for <oauth@ietfa.amsl.com>; Thu, 26 Dec 2024 10:08:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.758
X-Spam-Level:
X-Spam-Status: No, score=-0.758 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=numeracle.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mRlt-yBbwArZ for <oauth@ietfa.amsl.com>; Thu, 26 Dec 2024 10:08:18 -0800 (PST)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2120.outbound.protection.outlook.com [40.107.92.120]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2782CC14CE24 for <oauth@ietf.org>; Thu, 26 Dec 2024 10:08:17 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cXkskyif9TI2RddbqdXg7wUb41+PWeAeNEWxfjTI2MRymNywXP8/u5g2VQ48EV/j/i2S3icPktRYy2DM21YNiO05KbyjKkqjzoxNldz/vcTkTCt2iKNhN/NZ6iy0uGHRO1zxW7i0j1lxfrvP+tkddEASv3DRZbYwgsLk+qxt1+WozVNO1ZfH4X4Z3KJPKX5uhVclVZO/+1O4I8y5VrKysMe7dWXXjQe/9IKZg23FOWhMCWgxNRC2qwyc29udDqaXmydWs9fpRy+3ATauRquVxjNro8BeAfaa295GzqPn6ztcjSr34776IaBQPW5x4kT7rOjQe+a06mMCfb02FfiSeA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ipwx7s0ku7SXPoW2Nt9WLQWYy0zxRvsqXka3x1TnfMk=; b=j9ymrReRbUeNp/blxzBOrjpljL8/axeVtQZR7aFNu2+GtaIA9yqompskQ8zM2qp3sMlCqq42aTloGBd6m7Ml1qJ+wyS65TW73rocNBDxq88wWvRiR+nNQ0bGfGQ/qKzUHUf61E+3RGlT2wB05KGm0DCtDQZt795O+ZBWnmniYsDsqNQR8J9bAXZIFvOWk99mBKLXb85FX/QyA7YenjLZpTj2nTVRkHds7V0MYgbl9oFzthRl+X2UWej7mi59euBoEsnGUOTYLHS/tsQESMLsPQbWTFj43j8bYsZWfq+UDTDCcMByjVNjRmgpYKE0x0iT/OUIlrzSEBaNtFz1l6tj+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=numeracle.com; dmarc=pass action=none header.from=numeracle.com; dkim=pass header.d=numeracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=numeracle.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ipwx7s0ku7SXPoW2Nt9WLQWYy0zxRvsqXka3x1TnfMk=; b=MRpp4sf/falyT/Hm6cQaz6hxMSHXhzF0MS+L6gtvdMxgs/xkzZprAJOL9mkkhIao2Mnvmg2JSWDCWDF+aHTxcV/3Sdjo56nfae3CQw7Ks6nC8kO7yV+22maj8+L2kkGsG3FuO4pvPFnAdcwt/ioZBm6TBKnJjrmLYXC8BI1XvdT5boBcwkZDhqlNhrIqUl37RBpXQkHHowKcCnli82bye6EX8njmcrojMmmdpYQs/zjAx4st2azMPfYwq7iwYi8hLa3QR/zd+hqmJ6bnLDiUf/vPwgyO7x/cc8QlSINWJM76szPWnHaY1UNf4cUbfaXNuBWdyDfKmniH8Iw/kiZDmA==
Received: from CH3PR13MB6747.namprd13.prod.outlook.com (2603:10b6:610:1e4::5) by MW3PR13MB3945.namprd13.prod.outlook.com (2603:10b6:303:2f::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8293.15; Thu, 26 Dec 2024 18:08:10 +0000
Received: from CH3PR13MB6747.namprd13.prod.outlook.com ([fe80::2f39:dcae:9ef7:d518]) by CH3PR13MB6747.namprd13.prod.outlook.com ([fe80::2f39:dcae:9ef7:d518%3]) with mapi id 15.20.8272.013; Thu, 26 Dec 2024 18:08:10 +0000
From: Pierce Gorman <Pierce.Gorman@numeracle.com>
To: "peace@acm.org" <peace@acm.org>, Wayne Chang <wayne@spruceid.com>
Thread-Topic: [OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.
Thread-Index: AQHbVi5o8nrYH/JVOE6XQKeJprEBCrL1ssUAgAAA6YCAAAL4gIAAAemAgAMYDMA=
Date: Thu, 26 Dec 2024 18:08:10 +0000
Message-ID: <CH3PR13MB674707F34A0C44DDF538178AE10D2@CH3PR13MB6747.namprd13.prod.outlook.com>
References: <CACsn0cnEJKamSSJH4-pKg1xNZ3X+__B4UwZ3P5enxP5tQ4AqzA@mail.gmail.com> <CAK2Cwb4L-KTkK96CJNwpZNiYiyMQSyH35MHNnOLEiWW+_FojZQ@mail.gmail.com> <CAFTzAXjq8AhZKKM5LC7ykFqTUAHJUD70kscrpLH-MaUFfiv_Hg@mail.gmail.com> <CAK2Cwb6Ajud45wQWvF5zDoxZSAQ2Hio55vz-rRHy=OGSvx=eXQ@mail.gmail.com> <CAFTzAXh68jH64_Pry1koyU6j-m03_kQo_Y6qfJ9BtCJVGdvWYQ@mail.gmail.com> <CAK2Cwb77n5tBh=+VD3CM4evzExDHnpdDQHQQpk7HNCcR5x8q4A@mail.gmail.com>
In-Reply-To: <CAK2Cwb77n5tBh=+VD3CM4evzExDHnpdDQHQQpk7HNCcR5x8q4A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_ActionId=0e005cd6-993b-4a43-9e41-485be6c2609f;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_ContentBits=0;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Enabled=true;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Method=Standard;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Name=Confidential;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_SetDate=2024-12-26T17:49:17Z;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_SiteId=b807d15e-47b0-447f-a656-f397dba6285c;
x-codetwoprocessed: true
x-codetwo-clientsignature-inserted: true
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=numeracle.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH3PR13MB6747:EE_|MW3PR13MB3945:EE_
x-ms-office365-filtering-correlation-id: 069832a1-d937-4a84-4279-08dd25d841a4
x-ms-exchange-atpmessageproperties: SA
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|4022899009|10070799003|1800799024|376014|366016|8096899003|7053199007|38070700018;
x-microsoft-antispam-message-info: WTeYf7dezwc/UNRSDihYn2X/suYevq4ZAn541mpn4agqTz5QvKJz8v2pHkNgIXWWgMIoijM5mKL34ADHZeegxABR9kle500YqhCwew2EOtrw0N5NC4pvzCxI9h2TYEROZvSkPG73eiSMdbW0YYOj5jZTIs2etBM1mZQovpUGu3EPMSv4vpHFzqw2WXEeYPXkmfFLHeJtD9l8JD0SgoZh/lFf2AZyY0Gm5d2EWXr2TfE8fL6Mkt/pwviQizx2E+E2ZqU2dMfgfRitvAm51h3PvLhWXQ5GvHvpWaJ0lVAWW3QxPvyBp44H+NZmwiQ050CJLrddRXYf9biXiYlANKeW82q6VpTUMsgB+TrF7g+RFWWoMMrYUSTZcoWtnQFbmdzRJpPoRQM1oFlUg7vyj7FJbi1ZGRsMtxDTkQvxqQwRGA0mWEcE/nClzSP4k730u+HroTYKuBEbKsKIhilbdCj6YTpc0JoNq0etvJ8UaAMnXmM4vWMJGZwdgRX0ObIdk7duUkl9c7DZTZy59ay4th2Xsnro3yqQrLhrg24BS5CrON/ot0xUm2Z2/RvKYj6yX/7mO2Ea6/ro6sg3M8cq/thZ+atG2BmKtMvD0ZVdq3hzqqxWoBzpemk6vjJtX1cQXx59KyPrVqUexv6Wxag3Ex0RJu/KUbNtR+vXCUM4prfhdpkab+SIJ9s283mtnd7YuOjwYQ8KFjCQN0necfbgzXGWnHctSCI4IYkEtCdqqJbHpTzP4h5Nb/6eqsJcj3nEYg66V1KU23v+FG7QtlW93uNLNHzZEAceOt01I417IJDlZjglOIRdtVbD5ztiLDv+jE1gIbswQng0uE8d53LLgF0z2jHuTpoSz23/tgs4F0uzCyLmyAD0au/5rR45fNf58rikef70k5ty14RIAvXaMPUX0Bp8X8L7jp/OIctlY7EaWc6nI+i67MeA+QGstnTt3E6E5wMkMt1ha9ALhsQrZjbxBaoub9fzB4a+6fqdvxoFcVp0xTderxXKYqh0dYuEwwlHyBlrtUhGFLlJ5mDl8qZTykwjIzM0GXD6vzLwCudTi5oxwf6V56sG8kx/oN8VrLfq/7DPYFScHX8ckYbfWupPTFKJp1wkFeEKLaZkDPB2pVt/dmEXBbfy/9nxB5I5wfnjllVYhiDBlDjzrnX2WCr/f17OMq+E+J41iZXvskkjWXjTA1lw6+Hpuo/6vOie1l+fS1YmW0r7Joz78fN1iJoC4t8e+/uywzj+WGHrNMz0JL/RF71mYZghln+lP/EII1EE33YY0qlNY8/ghQj4w0LD3zBqNU8WmjWy+cngagEZ3ZhC6+XDAtgf1opBrIhLgqypkZNOESjkEj87sYE2tjx7GkIUtrUFGhM6EEez+ft5emYfopjnFzKvHZQp9e7E3a0V
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH3PR13MB6747.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(4022899009)(10070799003)(1800799024)(376014)(366016)(8096899003)(7053199007)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH3PR13MB674707F34A0C44DDF538178AE10D2CH3PR13MB6747namp_"
MIME-Version: 1.0
X-OriginatorOrg: numeracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH3PR13MB6747.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 069832a1-d937-4a84-4279-08dd25d841a4
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Dec 2024 18:08:10.0821 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: b807d15e-47b0-447f-a656-f397dba6285c
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pw0FSoyjwrjxKe5ASN2fk9u104qQgKGSI+c8fqBH4k2KVLsjKOcYkVFVunAlCqdNa0zADMpDAp/R6riXDwskrNz2IwRj0kYCw9dE5Sut8n0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR13MB3945
Message-ID-Hash: XNQ6B5BYX3AIYMWIOZWQGAUHHRQWUXYO
X-Message-ID-Hash: XNQ6B5BYX3AIYMWIOZWQGAUHHRQWUXYO
X-MailFrom: Pierce.Gorman@numeracle.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: John Wunderlich <john@wunderlich.ca>, IETF oauth WG <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/EPPLksD4HAvI0RtId4eg44Orvok>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

What mechanism(s) are you referring to that “involves trusting the telco”?

Telecoms providers vary widely in their abilities (and regulatory regimes), and the telecoms technology continues to evolve.

Voice over IP (VoIP) wasn’t really a thing 30 years ago but I will assert the majority of network-to-network interconnection is now dominated by VoIP.  And, the dominant VoIP protocol (Session Initiation Protocol aka SIP) was originally designed to operate peer-to-peer, and it isn’t hard to imagine a day when peer-to-peer will be the dominant operation instead of telecoms network to telecoms network.

Whatever mechanism you think would be the “good thing” needs to be able to exist independently of existing telecoms infrastructure.

Pierce



CONFIDENTIAL
From: Tom Jones <thomasclinganjones@gmail.com>
Sent: Tuesday, December 24, 2024 12:34 PM
To: Wayne Chang <wayne@spruceid.com>
Cc: peace@acm.org; John Wunderlich <john@wunderlich.ca>; IETF oauth WG <oauth@ietf.org>
Subject: [OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.


EXTERNAL EMAIL
There is always the potential to come up with a cred that will be accepted as enabling access to some resource.
There are some proof mechanisms that state that the bearer has a cred that enables access.
What we have not achieved is a mechanism that ties the cred to the holder without an ID number binding to the holder.
That would be a good thing - but the only way I know involves trusting the telco - which we all know is a dead end.
What other mechanism can bind the holder to the device w/o the telco (or do we just nationalize the telcos again.)

Peace ..tom jones


On Tue, Dec 24, 2024 at 10:29 AM Wayne Chang <wayne@spruceid.com<mailto:wayne@spruceid.com>> wrote:
No, I don’t mean an ID number. More so attributes of an entity attested by a non-governmental entity, and it could use privacy enhancing cryptography in this steelman.

Best,
Wayne Chang
Founder & CEO | SpruceID<https://spruceid.com/> | LinkedIn<https://www.linkedin.com/in/waynebuilds/>


On Wed, Dec 25, 2024 at 02:17 Tom Jones <thomasclinganjones@gmail.com<mailto:thomasclinganjones@gmail.com>> wrote:
if by ID you mean ID number - then it is a tracking number.
Isn't it super obvious - why are we pretending to be privacy enabling?

Peace ..tom jones


On Tue, Dec 24, 2024 at 10:15 AM Wayne Chang <wayne@spruceid.com<mailto:wayne@spruceid.com>> wrote:
Tom, how do you feel about private sector issued ID?

Best,
Wayne Chang
Founder & CEO | SpruceID<https://spruceid.com/> | LinkedIn<https://www.linkedin.com/in/waynebuilds/>


On Wed, Dec 25, 2024 at 02:04 Tom Jones <thomasclinganjones@gmail.com<mailto:thomasclinganjones@gmail.com>> wrote:
While Waton's statement is correct - it does not address the core problem with any credential that comes with an ID.

All reusable IDs enable tracking.  Full Stop.
All government issued ID enable tracking. Just like social insurance number or any other cred.
So - if you want privacy - don't release the ID number.

Peace ..tom jones


On Tue, Dec 24, 2024 at 6:34 AM Watson Ladd <watsonbladd@gmail.com<mailto:watsonbladd@gmail.com>> wrote:
I see that people are uncomfortable with making any mandates, and so I've tried to be purely descriptive in this proposal. I leave it to the WG to decide where to put it, but I see it as a wholesale replacement for some sections to emphasize clarity.

 "SD-JWT conceals only the values that aren't revealed. It does not meet standard security notations for anonymous credentials. In particular Verifiers and Issuers can know when they have seen the same credential no matter what fields have been opened, even none of them. This behavior may not accord with what users naively expect or are lead to expect from UX interactions and lead to them make choices they would not otherwise make. Workarounds such as issuing multiple credentials at once and using them only one time can help for keeping Verifiers from linking different showing, but cannot work for Issuers. This issue applies to all selective disclosure based approaches, including mdoc. "

Sincerely,
Watson
_______________________________________________
OAuth mailing list -- oauth@ietf.org<mailto:oauth@ietf.org>
To unsubscribe send an email to oauth-leave@ietf.org<mailto:oauth-leave@ietf.org>
_______________________________________________
OAuth mailing list -- oauth@ietf.org<mailto:oauth@ietf.org>
To unsubscribe send an email to oauth-leave@ietf.org<mailto:oauth-leave@ietf.org>
_______________________________________________
OAuth mailing list -- oauth@ietf.org<mailto:oauth@ietf.org>
To unsubscribe send an email to oauth-leave@ietf.org<mailto:oauth-leave@ietf.org>
_______________________________________________
OAuth mailing list -- oauth@ietf.org<mailto:oauth@ietf.org>
To unsubscribe send an email to oauth-leave@ietf.org<mailto:oauth-leave@ietf.org>