[OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.

Tom Jones <thomasclinganjones@gmail.com> Fri, 27 December 2024 01:26 UTC

Return-Path: <thomasclinganjones@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE43BC14F602 for <oauth@ietfa.amsl.com>; Thu, 26 Dec 2024 17:26:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jm-GGNLK57Eg for <oauth@ietfa.amsl.com>; Thu, 26 Dec 2024 17:26:31 -0800 (PST)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 25248C14F5EF for <oauth@ietf.org>; Thu, 26 Dec 2024 17:26:31 -0800 (PST)
Received: by mail-lf1-x12c.google.com with SMTP id 2adb3069b0e04-53e399e3310so8289641e87.1 for <oauth@ietf.org>; Thu, 26 Dec 2024 17:26:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1735262789; x=1735867589; darn=ietf.org; h=cc:to:subject:message-id:date:from:reply-to:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=E/v50EklxA2JjFezInbTHKCOZMD1jE+cJq9YNtX2erI=; b=PlBNrAe5THyBuExO8JRb2dtcHeWj9kbgL9RkKsIHzygN/lqL39PA/QL4LNWZ/3qJfc tQxnL/Xwp44WH0A4nP+5/aO4VBSJcXgc7KtpQPWKjoA/PIlrZaNe2sM3+2mD02+idpRL ZhkHgxwly/k4nVoyRIXyxlNN9j7WaKgAfhHXzr0EClhLwqkaRlfbx7S1EjpCcviUYipt lJVtIqY2YV+iDbvPVQIWLHFWcu3xCYbFuobZbmuPX+Lz3CJeml0GEsj0c9VjQy3j0iVF js1BKeH4r4wursZikrL811AkALsBnI9oPjVU3n38NI27Z3uiOSkVE3aYtITjkkhHoiQk bHNA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1735262789; x=1735867589; h=cc:to:subject:message-id:date:from:reply-to:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=E/v50EklxA2JjFezInbTHKCOZMD1jE+cJq9YNtX2erI=; b=NKPtNzWfiuW9pD86Ug5m2GMBlWaX0d7/DMfqe3AFm+igYRcVuc7ElityrfhEoz1cUy oWXdx3/VxIXPFMdbfCVShNLsdGYHLVRxjOuGKrOziWqirVqY/ffv64zdKKMI3z8arnK6 0pXaEKE5Zm7bZjy1EY8ERHIH5WznIBgzm+TYOK+d+rGAvE3Nl6g9rVe5qZAWPQfT8HV/ ZtD/09kh0qtkuv6CpVfc/XXq/fUHpUdKl/F2auVOfF1RW5YxBWwkWPwqxWrL+QwkvzCk T7taa0fODykMDookTwiY6T4pQjpKBIReBXSgbegvP0wNyCGBMIH8oJRIbzMJW2bLV5Q4 +hXA==
X-Forwarded-Encrypted: i=1; AJvYcCXHTJOBPp+DaRxYjr7tUqVeoTiO49yx7UfIaQ88hBUyHbjDcpnLsgMFvtkI0YNT844HZauv7w==@ietf.org
X-Gm-Message-State: AOJu0YzNcU+uDkJrt7DLh2uJ9q7QG5LDB8FFoS+ETMl32LWZZmIJi6W4 Ep5mdiBvZzE6oWj6/DA7ioawWKwaglA21LXA8+KKtW69yv6gOBKSUGwRe668H0twKkJ0yQPGr/a u/GVBjzM6C9nqxoqyGGUyNvG4ztZoQQ==
X-Gm-Gg: ASbGncsZEzlbSqqyUGVRrj36l6estu8sJDEzKS3/0dYp/EOOpyePAUNO+yCuSqSos0F YNbZ6wlgD9/7hJDP+RXzWw+iMBaU+WpLRUQ1YSWF91idllDLK1Z5HSgBwIz9kH4nYqpqyXA==
X-Google-Smtp-Source: AGHT+IHFGRlfQ4jbmU1545K5rjJO+p2/TKWyaRrxsbQoABDdJy1pFPE2ONIBYhy/+NdmJZ5UR+gaKLl5fM74XE3Fgec=
X-Received: by 2002:a05:6512:3049:b0:540:20eb:80c5 with SMTP id 2adb3069b0e04-542295602bcmr7315186e87.37.1735262789078; Thu, 26 Dec 2024 17:26:29 -0800 (PST)
MIME-Version: 1.0
References: <CACsn0cnEJKamSSJH4-pKg1xNZ3X+__B4UwZ3P5enxP5tQ4AqzA@mail.gmail.com> <CAK2Cwb5cf9uHJBNZp2rZ+BQcUNPpC7-GfPPhu4ben1N6ZyEa9w@mail.gmail.com> <005A4346-84CE-47CD-BCCC-9EE236F569F1@alkaline-solutions.com>
In-Reply-To: <005A4346-84CE-47CD-BCCC-9EE236F569F1@alkaline-solutions.com>
From: Tom Jones <thomasclinganjones@gmail.com>
Date: Thu, 26 Dec 2024 17:26:16 -0800
Message-ID: <CAK2Cwb6oVha8wM9+ERet8vXJT=+LeaL3Ju1ePq-6e+ye9_evrA@mail.gmail.com>
To: David Waite <david@alkaline-solutions.com>, pemc kantara <Wg-pemc@kantarainitiative.org>
Content-Type: multipart/alternative; boundary="00000000000022972b062a365a86"
Message-ID-Hash: NLEBKKDJRJTXM2XDB7TRLQ5HJ5U5YBIC
X-Message-ID-Hash: NLEBKKDJRJTXM2XDB7TRLQ5HJ5U5YBIC
X-MailFrom: thomasclinganjones@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: peace@acm.org, IETF oauth WG <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Reply-To: peace@acm.org
Subject: [OAUTH-WG] Re: Alternative text for sd-jwt privacy considerations.
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/JhELIrHYNyEHjlZX7GkKJGV83go>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>

I am appalled!

All humans must adapt to the consent plans of this small standards group!
I for one do not plan to adapt - sorry about that!

Peace ..tom jones


On Thu, Dec 26, 2024 at 4:15 PM David Waite <david@alkaline-solutions.com>
wrote:

>
>
> > On Dec 26, 2024, at 10:38 AM, Tom Jones <thomasclinganjones@gmail.com>
> wrote:
> >
> > This problem was clearly demonstrated by the California mDL hackathon
> where the default presentation was ALL DATA. That is the easiest path, so
> it remains the one most taken. We have known since standards were first
> introduced that they immediately create a drive to the bottom. This will be
> the fate of this standard as well. The most permissive interpretation will
> be the most common. The user's desires will not be met.
> >
>
> The consequence of splitting out the policy for controlling data release
> from the issuing authority is that the complexity that was the business
> logic for handling requests, determining if they are appropriate for the
> use case, prompting the user for consent, etc. is now all complexity pushed
> into the (likely third party) user agent.
>
> Architectures like PRIVACYPASS create individual solutions to release a
> particular type of information in the most privacy-preserving manner they
> are capable of. This sort of business logic is baked into the protocol, and
> the scope of implementation is thus boxed to solve that particular problem.
> The user agent can only work per the spec if it intends to work properly,
> and following the specification (hopefully) leads to a complete
> implementation.
>
> The majority of verifiable credentials systems proposed have no such
> bounds - which is one reason you are likely to see credentials often scoped
> to be issued only to specific, qualified wallets in production. Those
> specific user agents will enforce the required security and privacy
> requirements the issuer has for their credential. That is both their own
> policy logic to be enforced (such as a credential being bound to hardware),
> as well as their own requirements for appropriate user behavior (such as
> mandatory authentication and mandatory disclosure before the credential is
> released). That could include verifier authentication and having the holder
> agent confirm the verifier is authorized by the issuer to make the sort of
> request they are making - before a user consent prompt ever enters the
> picture.
>
> You could say that the captcha usage of privacy pass and AAMVA mDL usage
> are the same in that they develop trust frameworks that define the network
> of acceptable participants. I suspect however that the requirements for the
> latter contain significantly more requirements and potentially new
> technical works.
>
> A mDL hackathon has likely not set such policy or mandated that mDL and
> readers abide by it. They may not even have wanted to limit participants to
> having support for specifying complex queries (especially with the
> OpenID4VP query language changes which occurred recently). I’m not
> surprised a hackathon defaulted to a wide-open attribute policy.
>
> -DW