[OAUTH-WG] Re: We cannot trust Issuers
Watson Ladd <watsonbladd@gmail.com> Tue, 23 July 2024 03:33 UTC
Return-Path: <watsonbladd@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE6BFC1522B9 for <oauth@ietfa.amsl.com>; Mon, 22 Jul 2024 20:33:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6MP-fZLuPN8W for <oauth@ietfa.amsl.com>; Mon, 22 Jul 2024 20:33:31 -0700 (PDT)
Received: from mail-wm1-x332.google.com (mail-wm1-x332.google.com [IPv6:2a00:1450:4864:20::332]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4E48C18DBBF for <oauth@ietf.org>; Mon, 22 Jul 2024 20:33:31 -0700 (PDT)
Received: by mail-wm1-x332.google.com with SMTP id 5b1f17b1804b1-426526d30aaso37517685e9.0 for <oauth@ietf.org>; Mon, 22 Jul 2024 20:33:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1721705610; x=1722310410; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=91PdAivYYh1NHGrzg6lYrGPdkD3ORNJrWJOMTkhkf+g=; b=bsU81dYL3VN5OMuwiGxn0VGncXGLLPftcrygF/CjwpARNluISDkmsYUBYRlGS7djI/ EjN2OYK5mhUVktEth0VZoIJFGB9AlK9uHvwbKtNQLrfW3hlOvmq3lxzmgdQzuxmT5cYh HCYHwJavErRoSk1i3j1ZVbUoiarRr/gnrrgUgzqQjHVZnWV92t3nqsm200oeZ9WJV/W+ 6uyVDClrR/QICGmInPF7dHp0rra8hSaiaJ1zyucjvVTeVWQabCpeIOQuz05GoP8iWxJt xnjx/gN132dS05AKu6wA4QZWZe2z5NIeVjrWUEDtgtsFVEppuslVGxZNGi3ltHOI0DB1 9zig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1721705610; x=1722310410; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=91PdAivYYh1NHGrzg6lYrGPdkD3ORNJrWJOMTkhkf+g=; b=apIJXqnMarMvS0r9Y/KVYxH8a7zig7U6JLfsQydL4MKocmJbNnwLGWPYRGou6MfUKU ZJ7NXVNHXb6teg3qZzzNHLyCbrD40+9cgAKoHWcXYOc0B4duSsM55LrcwAKa8rQXazsJ 0dQfeMHeiNzWw6xuBrP227tdm/ARu+PXhcPYHhWSw30lIbZss7z1HJPS4enG/2yjXorh mZfyUddeBCK6/jk/vBEWR6DpYQ1YWJ7D7SChWbZxT874WgsO64Hb1/QmueyB52FAPE3S RnxVnMmy0WyJSHCeR2F9MqXNZ9DUerDIKKcJLMkzJAhg9MBD+/vaGdEaVXBGQTf3NPjt hpRg==
X-Gm-Message-State: AOJu0Yy38dqhSWXxRLF4uMPl87dx4gp2My2ximzBhd4YLylOBcxgq9wV NJOICHKFPFHXO2zz7tc5x/P3nx/YoR2vNC7GrYu8xosiRWULcmycB0qecD6hie3uC/jy6gqyDB4 Ii7lm6E6qvkwsIoO+6gA7tYmBxE8=
X-Google-Smtp-Source: AGHT+IGH2haXU8Wz0V1MZ+sMsYH9vLzF/kmVtOUNlkOWSheknlhfum8Kx6ERxy/+1iyZv1iSnwGykySj2t2xbVPcKgA=
X-Received: by 2002:a05:600c:1550:b0:426:5cdf:2674 with SMTP id 5b1f17b1804b1-427dc51a073mr58473895e9.4.1721705609800; Mon, 22 Jul 2024 20:33:29 -0700 (PDT)
MIME-Version: 1.0
References: <CACsn0cmy03viT6wboUZeVu_8Yf-m7As0rxcjpda2W_Xw6ohKNg@mail.gmail.com> <CAANoGhLsm1yqJvKuPEH_is-ep60EVNfLfi17T9M17KJFfAFiNQ@mail.gmail.com> <CACsn0ckXZVPznV8cq4sMm1axCzMfd_M8FQ9BnMa5TTvPgZ8emg@mail.gmail.com> <CAFTzAXgcfeE84xq=G_+jpLt8Co8BasOan0t84QJyTsufhmLWsw@mail.gmail.com>
In-Reply-To: <CAFTzAXgcfeE84xq=G_+jpLt8Co8BasOan0t84QJyTsufhmLWsw@mail.gmail.com>
From: Watson Ladd <watsonbladd@gmail.com>
Date: Mon, 22 Jul 2024 20:33:20 -0700
Message-ID: <CACsn0cmUa6xZGmJkKOoO+W_rCgNLYsGsd+xDtB=hTd7=Rqn2kg@mail.gmail.com>
To: Wayne Chang <wayne@spruceid.com>
Content-Type: multipart/alternative; boundary="00000000000047b344061de1d328"
Message-ID-Hash: GM6UTHNY5QFDILCTIHZ7YIURCYPQYSDN
X-Message-ID-Hash: GM6UTHNY5QFDILCTIHZ7YIURCYPQYSDN
X-MailFrom: watsonbladd@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-oauth.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: IETF oauth WG <oauth@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [OAUTH-WG] Re: We cannot trust Issuers
List-Id: OAUTH WG <oauth.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/UX_k6qcwc6SKdGnymKexuQ3bzkM>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Owner: <mailto:oauth-owner@ietf.org>
List-Post: <mailto:oauth@ietf.org>
List-Subscribe: <mailto:oauth-join@ietf.org>
List-Unsubscribe: <mailto:oauth-leave@ietf.org>
And the draft doesn't have a sufficiently strong statement saying this tech (which has significant limitations: every TEE has fallen due to side channels) is needed for relevant application scenarios. I'm not saying this work shouldn't continue: I'm saying that we need to ensure we get the privacy and security considerations right, and make clear the limitations and that users shouldn't be mislead about the degree of anonymity they have. The applications being envisioned are dangerous. Sincerely, Watson Ladd On Mon, Jul 22, 2024, 6:51 PM Wayne Chang <wayne@spruceid.com> wrote: > Hi Watson, > > Here’s an approach based on TEEs that can in theory create unlinkability > for things like mdocs and SD-JWTs while also conforming to FIPS 140-2/-3. > No new crypto, and PQC-friendly. > > > https://blog.spruceid.com/provably-forgotten-signatures-adding-privacy-to-digital-identity/ > > Best, > - Wayne > > On Mon, Jul 22, 2024 at 16:26 Watson Ladd <watsonbladd@gmail.com> wrote: > >> >> >> On Mon, Jul 22, 2024, 3:30 PM John Bradley <ve7jtb@ve7jtb.com> wrote: >> >>> I agree that single-use proof keys and batch issuance are a must. >>> >>> Issuer verifier collusion is admittedly a problem. To address that we >>> do need different cryptographic methods. >>> >>> MDOC also has the same issue. >>> >>> We should document the risk, but short of stopping EUID and mobile >>> driver's license deployment, we have limited options. >>> >> >> The problem only appears when the drivers license or EUID is used in a >> way that makes the user think their data is private. You don't have to >> support UX that lies to the user. >> >> >>> Hopefully, we can make quick progress on JWP. >>> >>> John B. >>> >>> On Mon, Jul 22, 2024 at 2:14 PM Watson Ladd <watsonbladd@gmail.com> >>> wrote: >>> >>>> Dear Oauth, >>>> >>>> I'm disappointed to see SD-JWT work continue with inadequate privacy >>>> considerations. The fact is an Issuer can link any showings to >>>> issuance of the credential. This is not foregrounded sufficiently in >>>> privacy considerations, nor do we discuss how to ensure users are >>>> aware. We really need to use more RFC 2119 language and highlight >>>> these issues. Section 11.1 about local storage which has never been an >>>> IETF concern before is far more prescriptive than 11.4, and that's not >>>> a good thing. To be clear, the threat model must include an issuer >>>> that is a government issuing credentials that if used to verify age on >>>> certain websites or via a digital wallet on site, and learned about by >>>> the issuer who may have access to data from the site, will result in >>>> imprisonment or execution. This is not a hypothetical scenario. >>>> >>>> Users and UX designers will have intuitions that do not match the >>>> reality and that result in bad decisions being made. That's on us. A >>>> driver's license doesn't leave a trace of where you showed it, but the >>>> SD-JWT does. >>>> >>>> At a minimum I think we mandate batch issuance and one time usage >>>> using RFC 2119 language. We need to say in clear, unambiguous English >>>> that this mechanism enables an issuer to connect every presentation of >>>> a credential to the issuance. >>>> >>>> Sincerely, >>>> Watson Ladd >>>> >>>> -- >>>> Astra mortemque praestare gradatim >>>> >>>> _______________________________________________ >>>> OAuth mailing list -- oauth@ietf.org >>>> To unsubscribe send an email to oauth-leave@ietf.org >>>> >>> _______________________________________________ >> OAuth mailing list -- oauth@ietf.org >> To unsubscribe send an email to oauth-leave@ietf.org >> >
- [OAUTH-WG] We cannot trust Issuers Watson Ladd
- [OAUTH-WG] Re: We cannot trust Issuers John Bradley
- [OAUTH-WG] Re: We cannot trust Issuers Watson Ladd
- [OAUTH-WG] Re: We cannot trust Issuers Richard Barnes
- [OAUTH-WG] Re: We cannot trust Issuers Michael Prorock
- [OAUTH-WG] Re: We cannot trust Issuers Dick Hardt
- [OAUTH-WG] Re: We cannot trust Issuers Wayne Chang
- [OAUTH-WG] Re: We cannot trust Issuers Leif Johansson
- [OAUTH-WG] Re: We cannot trust Issuers Wayne Chang
- [OAUTH-WG] Re: We cannot trust Issuers Watson Ladd
- [OAUTH-WG] Re: We cannot trust Issuers Nat Sakimura
- [OAUTH-WG] Re: We cannot trust Issuers Brian Campbell
- [OAUTH-WG] Re: We cannot trust Issuers Tom Jones
- [OAUTH-WG] Re: We cannot trust Issuers Watson Ladd
- [OAUTH-WG] Re: We cannot trust Issuers Brian Campbell
- [OAUTH-WG] Re: We cannot trust Issuers Watson Ladd