[OAUTH-WG] Re: Call for adoption - PIKA
Giuseppe De Marco <demarcog83@gmail.com> Fri, 14 June 2024 08:27 UTC
Return-Path: <demarcog83@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A63AAC14F6FE for <oauth@ietfa.amsl.com>; Fri, 14 Jun 2024 01:27:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.856
X-Spam-Level:
X-Spam-Status: No, score=-1.856 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F_NsiRrlvjyI for <oauth@ietfa.amsl.com>; Fri, 14 Jun 2024 01:27:08 -0700 (PDT)
Received: from mail-ej1-x62b.google.com (mail-ej1-x62b.google.com [IPv6:2a00:1450:4864:20::62b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5765C14F704 for <oauth@ietf.org>; Fri, 14 Jun 2024 01:27:08 -0700 (PDT)
Received: by mail-ej1-x62b.google.com with SMTP id a640c23a62f3a-a6f51660223so114716566b.0 for <oauth@ietf.org>; Fri, 14 Jun 2024 01:27:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1718353627; x=1718958427; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=LYC5sQ6gd8MS9JWE/TgAVvvh1psPa8ir46xIZ5xGH5I=; b=ONWYjFq1kZteBX+jD+wCSIpFWL0y+3OUjzd/j2kJcYvlaByS5/gWnVD2hhJBehvZwA CYH5Gk+1WemcG3+y9ViDDLevf99ZJ79kXq533UHMtRSfA4IUsygRk/zOtPos07uoEG9r pYtChFy5Ua5stk9gbXNeV5R5Wu4VkFbRXbO/Xao96T4SZ9EPS/s8+TwrmC2MTtH+eWnw vPLwFsKRbRRXRXo55k36g/deIJwNGmHsMmpPk37+q9Rb0NJdq/Ovb1HeiLV+iOgqcB/b 7rKWW9OP1QD3UQ3tTXchMu3sRD54xFiCfzeT4KluKwfbbLHQ9Tb012QYXPCcV4bPPwMN Pkvg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718353627; x=1718958427; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=LYC5sQ6gd8MS9JWE/TgAVvvh1psPa8ir46xIZ5xGH5I=; b=uvqt2XPxMEyhV6gFy43ppqDGMibLTpWo9TOkEFHVVhegN6IJTKDboUlzAlZfAWbq8G aWawbO22T0ABGz9LVFCyrRAex1RvDT6wysfv5QqbutBdmqAoOIEs0185wnonTi/66OD6 zf+EeVxJcm88b+vE/Fd//Smoj54Xx1AV3LiOKKtM6Cx5Fn8IV0qaQUb2tYs6WqTUO0Dy UMVC3VUuEgZIegao6Ncy5uOsjTsADULh82jKjE9WMgfx/a4WFUVE3hcuIa7dKJHrGz7u g4iFcHosYHNmtT3ji74uaYYyrbF0qQsHARuSjZ9V/nYv93D4dYizzxGegHcdZfmnISIO +aFg==
X-Forwarded-Encrypted: i=1; AJvYcCVpW6laPQcBbcwWTr4KtAPXMMoS3UwDzLTRi8IdJnabzqVLl+bX4XTH3PrRgB1vvyN7aBvfjZl38DbZ8OQIPg==
X-Gm-Message-State: AOJu0YzTVRxSffo88EpP4mfrFfzz6MXV/H8zzi0jeC2x3UdZF6J/V+Ws yjofnutMKBE516vFE1nveLpVxbKU0eyg06gEsU0dVxFVQtamIj5r3HTjAuAyN3xKdyIXntbZdA8 +ghETxaf9qiRgkDcHXYWBMw+/CnZUOrzC
X-Google-Smtp-Source: AGHT+IFYp5F4sVtT0Q4xJDTQF9dHQ4l0S2ulQ1TlKZCiUleOPza3a9gBLXtG1T5Ggs9GfxG5YVRB1UnhZGHNv59dscw=
X-Received: by 2002:a50:ccd5:0:b0:57c:8035:50ef with SMTP id 4fb4d7f45d1cf-57cbd8b98e6mr1563009a12.35.1718353626860; Fri, 14 Jun 2024 01:27:06 -0700 (PDT)
MIME-Version: 1.0
References: <CADNypP9GmF4vp1uzLXK0YYZAHUDjK7RHbhEb4MCXkB7N3Oq4+w@mail.gmail.com> <CAL02cgSEt8z3zsLC6U5eqhMSHbn-+7uywZCQUrUpJ9zQwQeShQ@mail.gmail.com> <SJ0PR02MB74398B6C188C5D374B86F81BB7C72@SJ0PR02MB7439.namprd02.prod.outlook.com> <CAL02cgTMSgi-boxZAjkFc8_JrEJrGzk=LH5BnS2Earx-Ji2j9A@mail.gmail.com> <SJ0PR02MB74398BDC255CC7D533FC3149B7C72@SJ0PR02MB7439.namprd02.prod.outlook.com> <CACsn0c=TH=YyLRPaZXzd=oD1ZSm2-yvA1WxpxcMe6kLm=JwrNQ@mail.gmail.com> <CAK2Cwb6V_biszxSqxaykFDTowAD2STpzts=48=Rd_KeMie3+Ug@mail.gmail.com> <CAP_qYynE8wuvVCCBKFJai8LshMC5qY3PrNXYCOwnTq5C0gRyFQ@mail.gmail.com> <CAKoiRuaRQUL0qA6oM5v3jzjEm5an0-OK=wEoqk1u7iZmgQEuRQ@mail.gmail.com> <CAP_qYy=RbZwB+36gNTBiBDdDeKrxGxmp-+1L+4UZxoakuaC1nQ@mail.gmail.com> <CAKoiRua_yeSzHrBJ0SwLnQr9P9MDUnTEejqi+kEL6Hd_1s5Jsg@mail.gmail.com> <CAP_qYykfZyb5JbzPjE0tPwMxHC-7G01fiX9Jq-Y0xtnBc4ee6A@mail.gmail.com> <CAKoiRuYt_GiLJDj3XiTqi4PyiJzMvSh-6-13LO53wWjgej2jkQ@mail.gmail.com>
In-Reply-To: <CAKoiRuYt_GiLJDj3XiTqi4PyiJzMvSh-6-13LO53wWjgej2jkQ@mail.gmail.com>
From: Giuseppe De Marco <demarcog83@gmail.com>
Date: Fri, 14 Jun 2024 10:26:55 +0200
Message-ID: <CAP_qYy=O-epzpk9L1uFMBVR1B=SbDH0aLU1gZQfFnT_D1m1VhA@mail.gmail.com>
To: Rohan Mahy <rohan.mahy@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000871871061ad561c4"
Message-ID-Hash: 5CDVGSG5YJEKH4BCYLEBVUKIFAZKN2PN
X-Message-ID-Hash: 5CDVGSG5YJEKH4BCYLEBVUKIFAZKN2PN
X-MailFrom: demarcog83@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: oauth <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: Call for adoption - PIKA
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/LgUct5RjOl7cWImt2YIeT5Li9r0>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
I support people who only want to do offline validation of the issuer domains. I support extensions as well, to not force people to believe that subject's identity and cryptographic material attestation alone are sufficient (at list in the cases where they should not according to the trust framework in use). I want to work with you to define, within PIKA, the best approach to enable additional mechanisms to extend the current pika trust evaluation to more detailed checks and inspections and in a total modular way, where openid federation can be one of these extensions. I support the trust evaluation mechanism starting from what already proposed in the PIKA draft. I want to avoid that X.509 certificate may add custom extensions to satisfy the used trust frameworks, and therefore get bloated with informations that go out from the original scopes of the X.509 certificates. I say this according to the experience I had in a national SAML2 federation where X.509 certificates was inflated in this way (sorry for giving documents in italian, these was never been traslated): https://www.agid.gov.it/sites/default/files/repository_files/spid-avviso-n29v3-specifiche_sp_pubblici_e_privati.pdf The bulge of X.509 certificates represent only one of the reasons why in Italy we have implemented openid federation. I'm concretely interested in following the evolution of PIKA and give any contribution you may allow me to share and do. Il giorno gio 13 giu 2024 alle ore 09:36 Rohan Mahy <rohan.mahy@gmail.com> ha scritto: > Comment inline. > > On Wed, Jun 12, 2024 at 8:39 AM Giuseppe De Marco <demarcog83@gmail.com> > wrote: > [snip] > >> > Today relying parties verify the issue domain indirectly by opening a >> TLS connection to the https URL of the issuer, which involves an X.509 >> validation of the issuer domain name in the URL. >> >> Amen. this give us the certaininty that the subject is exactly the one >> we're supposing to interact with, untill the DNS were not compromised and >> an evil endpoint with let's encrypt would appear on the way. Therefore the >> decision about the trust anchor to trust is crucial. >> At the same time I use to trust (and love) let'sencrypt, therefore >> addings additional layers helps me in supporting all the CAs attested in >> the CAB forum and at the same time add additional security, policy and >> interoperability chjecks using another layer. >> >> > What is the problem with the relying party taking a certificate and >> validating the issue domain name directly using the same certificate? >> >> it is not a problem but a requirement. The relying party MUST do this. >> After doing this and got the assurance asbout the domain name, a more >> advanced trust establishment may occur where requirements need this. >> I have this requirements. >> > [snip] > > I don't see why the existence of these other requirements should prevent > people who only want to do offline validation of the issuer domain should > be prevented from doing so. That's what PIKA is for. Likewise PIKA does not > prevent a relying party from implementing whatever other additional > mechanisms of arbitrary complexity the community wants to standardize. > Thanks, > -rohan >
- [OAUTH-WG] Call for adoption - PIKA Rifaat Shekh-Yusef
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Kristina Yasuda
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Michael Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Rohan Mahy
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Watson Ladd
- [OAUTH-WG] Re: Call for adoption - PIKA Richard Barnes
- [OAUTH-WG] Re: Call for adoption - PIKA Joseph Salowey
- [OAUTH-WG] Re: Call for adoption - PIKA Ethan Heilman
- [OAUTH-WG] Re: Call for adoption - PIKA Giuseppe De Marco
- [OAUTH-WG] Re: Call for adoption - PIKA Pieter Kasselman
- [OAUTH-WG] Re: Call for adoption - PIKA James Carnegie
- [OAUTH-WG] Re: Call for adoption - PIKA Tom Jones
- [OAUTH-WG] Re: Call for adoption - PIKA John Bradley