Re: [OAUTH-WG] FW: Call for consensus on SPICE charter

nadalin@prodigy.net Wed, 21 February 2024 00:59 UTC

Return-Path: <nadalin@prodigy.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7911DC1930B6 for <oauth@ietfa.amsl.com>; Tue, 20 Feb 2024 16:59:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.093
X-Spam-Level:
X-Spam-Status: No, score=-7.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=prodigy.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xHLFJ83yLVs9 for <oauth@ietfa.amsl.com>; Tue, 20 Feb 2024 16:59:22 -0800 (PST)
Received: from sonic304-28.consmr.mail.gq1.yahoo.com (sonic304-28.consmr.mail.gq1.yahoo.com [98.137.68.209]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9E979C14F6AA for <oauth@ietf.org>; Tue, 20 Feb 2024 16:59:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prodigy.net; s=s2048; t=1708477162; bh=x4hSvpU/o9SbXfHGTIaSuNsbFPJRaf/6/8qJ6D7ejA4=; h=From:To:Cc:References:In-Reply-To:Subject:Date:From:Subject:Reply-To; b=dM5D4Esh7OhBRRisntiGMlLv9j7j6j1SyzKwkKJ13omK69Pt+ftsVyZyP2MvAnhj/aapQq9ixdCZEKQ4yCIjrqCuNitkDluDn8H/n5NRjEBmKaOViO0UPF2O3YOnt1Y4zIo8wVtiZInr/ZTQVUlWxDxH6Dee3QyL5HwwUzAr/LysY8y4qoeYLCBf3YpPczg2lORYS7kVaZNIoFUdSDs4oiqjVaHU+XyrT9yhc0dZzAbIiutuZfrRaOR8T8g1EBrwXZdb/7vOXQ5GKWO04H1/sxCND/MHNWjHDEi/Py/iH9OP1IbySkoWCXSvY4JX1eV2YejDlnmqE+LVsjR2yJNmJQ==
X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1708477162; bh=uRqQerz/JTsaCreCmWbNH6rbDzwv9YdzxkSzQEiva0S=; h=X-Sonic-MF:From:To:Subject:Date:From:Subject; b=uHOZdQGsVH5jdGN6xC4/O7NHC2BuoAHen3pErvCtJItwCyUp74swxKBYtZ1MtKOWXzaJkoyMCyu0MOzq/MK6NyABA02BeGvv7sPhtB6c+to35NAmpbzYLiEUA/TJgbPtknAZIUUD38gUOSiyVBsXF3cPp5Y7WQ12j31rbFxSMFFXnTERfFwBd5RG9Yxo0sI0B+igGUPh77P4yArUeOqEx0DLqnpZcQwtajTMaxiZRGyQexKsYm5ZI7Hxv/MX+f8Oe8pJdue+xmStRQtz4mf3YbeRtCY6DVFnODOafVwJQm7CpEMFTnDFapqPXQZYmJAZLz/K1rsNLVXfH3TjBA4fKQ==
X-YMail-OSG: ufqSJDwVM1nl065gpHAciCaEQ5TCUe9f0zbERw2T7MPWcL14G95S4xJEP6o8Fo_ 0TLoEiiHCKutWBiT1DNKgIyz9xADajH3qVLwuuMYaLKDjCHR4EKZNoxmXRFCRxkoKCGhYEVpQmZb rB0hSiWM9aTfSNM2DbPyRAXfmj7I9oGSx6WGZzxtAsYpmovl41Fu3lGDfRGdrcxC8vi4sSGaWYiC rQLHl7vPyayCfqYk7L.wIU8MwY21qCoPALWxdJgivAXM7OOTb7NRnKt1k5qTSflU3gbdkPwFddiY Lj7Rp6wnzYg4_8NIS71QdLLIxrteIc.eTvCGBCniM34WFIBrZTIudNK0LGUItNAvTF.SHZMTJoXW jaug1KXDWNgegpxGFx1enYKf_kHC53lYjiWEt5SqqUqeHbrgMcK..YGCstZWfAET0sTsJWgya2xY Xh5TYqZH74JVsci71b_3EIOA4SJhxaT1sAikeodSPPzCscub6YzsLzQPMefX0P9USZ6ZtVouG7gF bvKOnKaOdieJjPSHMUifi9b8NamqNKrItE2O8kRZqf8AQzN3V.yEzLaUVEljDCHAeRcppl6ZPdxj 50vEpgg9_GWhzTsNPNOVBg3DenfvrEDdPD6BIttORPFQIOceH2S2nMSet0SWOLUEIr2h5vq0Ys8U 8naEWhPr9qmjSIuZwSR190K_EoEtNOlfswUQFQPcf13yi_LZwzAh.o7K6ITtOhA2Yr5JqzjzecgR sClJNGzfTiDrrMnTTT.yyK9TjuCohkm8Far0vvDXX0q60_4dl6JF1bkqow_FaJGMUWxBUxQMRC26 5ggL.ts9bGzbH6d9g0xkHtU0BIkp8Q79JefeSQkfaLxOzKcnFZxagv4KJPWZ1IC_vgHoa9PnO.eP bxqbl97Z4xy0G3RwDeWBeWJ1RJ4e4r7T.98Qjwpp0AO4xRLIAu8sBUA9Lu9vvO0UMftzLK0ABlkX B6h_TraRyiC3Z_GmlAK_kbVlFjMbSBe7DxHZVHWnnuLw7VB.ZFSqtG1AITn9wmaKncA7QXMMzm13 UVheKtEZxhD5M6J94Jo6Fl6UOEeMOvdUIvg6v0RxK.2_O_sw7HtOfsj46My3qxoiMuRwS9sn3ovM BFWj1WIpswOUBgBMjCWdUtTW71ju5jPMcz83THFlKg5SvpapkuszcC4VS4owRSYRKJZSV6aEhTyE NWTk0tdGKwCFslhUrUvUOU.ha06jZ8TCcUZ4Bp4I.Sx0lcjreO2fRN5tb0F5aWZnjaMpLs0_tvYK zAT5vTwU_.qEcnPYf7KC1hxOp.Ez7iKFLp3WtLdZmGOhLHhAuIi04KhF1EEmtC.vvHUNatLk76TM CYB85eSDzJyE87rCX.69KH.Uuhaf1tcMS5cn_r725Mb3SLPDf7PhyyLLQ1MSGXZzpZxJiGWX3Pfz i43.1diqqPWa0rx7gChM.82sL_dfmbI3JhyvQZ1o3cqOUuB7e0PTz9rSrm7YyUeZp5rKkOl8S1G. AHK6HUwqJrr.esdiHwE9NJbRR538sHBg8aEOQeXP80PbCtGnWpw26VFWlyTuVm0U_1RwySORDFnH J6B..iZ0WrciAhoeecuNxyWbtgoAN_D9uxW.hBs9DckOJPQLlH1r9zdJrlKugt.TciotBGpHfkDX 7K8R7Qw9IsAYPhFpm3VQM.YjRTY0DGOaXwp7Um.vEYgJhj3_Y1S71PdVAmGDNJT7WllYcHnjnLKX XUz1L4pu48BMBPf7DIowPJ2giGPdALMqIGdzbYh7FjxvfsaReUZfEwNPEbZ_rt_LKkdiFOSTH917 PXjAHiHw9yLKR2_rffXsLYCVxihkoR3KuvO3aoJI4Pv4RP3JqKAISQXDOg5kd_PiNRTpwzDqFBrl 8MWEYoxMPSBssVql6ap.fJGS3nXlK282pRnE9kfHGU1g3YSfU1ZO3ijGbdhCzkhClMs0xEkLrm5a AP_Xl6nFTBk7.1ru9y9.2AUwaCiJpttcljRz_K0BLTNM0D0PXVFtHH5KuwtWSL8rnY4Apw2c67XX B.TZqc9ys52CVxaYRhkTgeJ1mnkYSsKsxiAucQUCeLN24LHDgOSPdlhRxbbhoNeC2fkoWXiYAV4X h0TXMnKM8MjPuYHp8bsL3QkMRRxLCZJW5ZV0zsShH2QTT0HzKvqHFbuJgmqKoTA9t4.XRWrYq.wn XMB0MTGzr5vLsRMBukjxc1VMakGBEC88U_IlrNKqblpsVDzxtWcqWOIP7bSsmIs7si1.VdwlTti6 l6wMiOcOggrau7iAsjgjrI1_nlCURNj05bIN4ZBUfp1bkziOB9nuvbtnhAUq6nj3_zTZqtNnFWRd zFQx..1NwdH5JuSFiyxg9B_3qSmw0eCPaB54-
X-Sonic-MF: <nadalin@prodigy.net>
X-Sonic-ID: d75ffddf-bbfe-416c-b911-8f0675edd92d
Received: from sonic.gate.mail.ne1.yahoo.com by sonic304.consmr.mail.gq1.yahoo.com with HTTP; Wed, 21 Feb 2024 00:59:22 +0000
Received: by hermes--production-gq1-5c57879fdf-llxbt (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID b634b1caa751892c29f4c9c3e4d4287f; Wed, 21 Feb 2024 00:59:19 +0000 (UTC)
From: nadalin@prodigy.net
To: 'Orie Steele' <orie@transmute.industries>
Cc: 'Roman Danyliw' <rdd@cert.org>, 'oauth' <oauth@ietf.org>
References: <BN2P110MB110725C85B7253C421DDFE71DC4BA@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM> <BN2P110MB1107C4999047DB10B00E71ECDC4BA@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM> <CAK2Cwb4okK1T67-4KyZTKBc846wcP7MVizZ2QYgJJFAcUcPz9w@mail.gmail.com> <07e701da6046$40e704b0$c2b50e10$@prodigy.net> <CAN8C-_JjmwhT3+347WybBV4J0f0ki0XH7GzYrMxozDxk25cVzQ@mail.gmail.com> <175f01da639c$e7c77ef0$b7567cd0$@prodigy.net> <CAN8C-_+=jsA35PdtsbnOeBg799_g84RfGSVX6do3xE+S1sLSyw@mail.gmail.com> <1b6601da641a$5f55b270$1e011750$@prodigy.net> <CAN8C-_+DMmYNg7ycBoiiCR_SaPFufbVQdTZjCMirXAkRU9_ACQ@mail.gmail.com>
In-Reply-To: <CAN8C-_+DMmYNg7ycBoiiCR_SaPFufbVQdTZjCMirXAkRU9_ACQ@mail.gmail.com>
Date: Tue, 20 Feb 2024 16:59:18 -0800
Message-ID: <1f1a01da6461$333445c0$999cd140$@prodigy.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_1F1B_01DA641E.2519DF60"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIOsEhqi/t9H2NGLATiCNmpI1/XrAGrwh8gAlXIWE0CqE+0SQFmikdoAi2a0PYCL9eeQwHbh1AgAdBeCI6wKo8+8A==
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/XJgFS93WX017kLKIWE9hwqezVB0>
Subject: Re: [OAUTH-WG] FW: Call for consensus on SPICE charter
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Feb 2024 00:59:26 -0000

Orie, many thanks for the dump on metadata, I understand now the motive.

If we keep it simple and just say a metadata Discover proposal for specific technologies there can be different proposals or the WG can make the call on which one is the one that they want to work on. We can also have an OUT OF SCOPE section and specifically say that general key discovery is out of scope. I don’t think this is too much work as everything does not have to be done at once.

*	A standard Metadata Discovery protocol for JWT,CWT, SD-JWT,SD-CWT,CWP and JWP technologies.

 

*	Out of Scope

*	General Key discovery is out of scope for this document, there are several mechanisms for distributing or discovering key material  (references go here),

 

From: Orie Steele <orie@transmute.industries> 
Sent: Tuesday, February 20, 2024 10:18 AM
To: nadalin@prodigy.net
Cc: Roman Danyliw <rdd@cert.org>; oauth <oauth@ietf.org>
Subject: Re: [OAUTH-WG] FW: Call for consensus on SPICE charter

 

Thank you for making this so clear, and easy to review.

I'd like to unpack some of the intention behind the "metadata discovery" deliverable, and hopefully this commentary will help others chime in, on if it should be cut from scope.

The original intention was to generalize this capability from the OAuth draft, to work with formats other than SD-JWT, what follows are excerpts from https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/:

> This specification defines the JWT Issuer Metadata to retrieve the JWT Issuer Metadata configuration of the JWT Issuer of the JWT. The JWT Issuer is identified by the iss claim in the JWT. Use of the JWT Issuer Metadata is OPTIONAL.

> JWT Issuers publishing JWT Issuer Metadata MUST make a JWT Issuer Metadata configuration available at the path formed by concatenating the string /.well-known/jwt-issuer to the iss claim value in the JWT. The iss MUST be a case-sensitive URL using the HTTPS scheme that contains scheme, host and, optionally, port number and path components, but no query or fragment components.

> A JWT Issuer Metadata configuration MUST be queried using an HTTP GET request at the path defined in Section 4.

> The following is a non-normative example of a HTTP request for the JWT Issuer Metadata configuration when iss is set to https://example.com:

> GET /.well-known/jwt-issuer HTTP/1.1
> Host: example.com <http://example.com> 
> If the iss value contains a path component, any terminating / MUST be removed before inserting /.well-known/ and the well-known URI suffix between the host component and the path component.

> The following is a non-normative example of a HTTP request for the JWT Issuer Metadata configuration when iss is set to https://example.com/user/1234:

> GET /.well-known/jwt-issuer/user/1234 HTTP/1.1
> Host: example.com <http://example.com> 

> A successful response MUST use the 200 OK HTTP and return the JWT Issuer Metadata configuration using the application/json content type.
> An error response uses the applicable HTTP status code value.

"""
{
   "issuer":"https://example.com",
   "jwks":{
      "keys":[
         {
            "kid":"doc-signer-05-25-2022",
            "e":"AQAB",
            "n":"nj3YJwsLUFl...5z50wMuzifQrMI9bQ",
            "kty":"RSA"
         }
      ]
   }
}
"""

The problem I see with removing a general purpose deliverable for this, is that we will see this kind of "key discovery stuff" repeated over and over again, as it is in SD-JWT-VC, possibly with minor or major differences that impact interoperability, and make it difficult for an issuer to upgrade from supporting SD-JWT to SD-CWT or CWP or go the other direction (there are good reasons the believe a vendor might want to support multiple credential formats).

My preference would be to define this "metadata discovery thing" in one place, and then refer to it like this in digital credential documents:

"Key discovery is out of scope for this document, there are several mechanisms for distributing or discovering key material, see $ref1, $ref2, etc."

Other documents might take a different approach:

$ref is mandatory to support, other mechanisms for distributing or discovering key material are optional, see $ref2, etc...

As you may be aware, DIDs are a mechanism for distributing key material, but for which resolution is not concretely defined, this has caused them to be very difficult to use, and it produced formal objects to their publication in W3C.

https://lists.w3.org/Archives/Public/public-new-work/2021Sep/0000.html

OIDC also supports discovering issuer key material, through well known endpoints.

Moving key material discovery out of scope for IETF deliverables is often a reasonable approach, but it is problematic if it is done for CWTs and JWTs differently.

The objective of the "metadata discovery document" was to ensure that SD-CWT and SD-CWP could reference a document that did what SD-JWT-VC is doing, without repeating the text that it currently includes.

It might even be possible for SD-JWT-VC to share that metadata discovery document as a normative reference, and then interoperability and reuse could be achieved across JWT,CWT, SD-JWT,SD-CWT,CWP and JWP digital credential profiles.

However, if this feels like biting off too much for a new working group charter, I would not be opposed to defering it to a potential rechartering discussion, its possible OAUTH, or WIMSE will have solved the problem for the formats above by then anyway.

Regards,

OS










 

On Tue, Feb 20, 2024 at 10:32 AM <nadalin@prodigy.net <mailto:nadalin@prodigy.net> > wrote:

Introduction

Digital credentials are essential to identity, authorization, licenses, certificates, and digitization use cases that are part of modernization efforts targeting efficiency and transparency.

A digital credential expresses claims or attributes about a subject, such as their name or age, and their cryptographic keys. Some sets of claim names have already been defined by the IETF and other standards development groups (e.g., OpenID Foundation).

Digital credentials typically involve at least three entities but can include more:

*	An "issuer", an entity (person, device, organization, or software agent) that constructs and secures digital credentials.
*	A "holder", an entity (person, device, organization, or software agent) that controls the disclosure of credentials.
*	A "verifier", an entity (person, device, organization, or software agent) that verifies and validates secured digital credentials.

In some contexts, holders may be willing either to partially disclose some values of their attributes or to demonstrate some properties about their attributes without disclosing their values. When disclosed by an entity, a proof of the digital credential needs to be provided and verified, so that only the legitimate holder of the digital credential can take advantage of its possession.

Some holders may wish to carry more than one digital credential. These credentials, together with associated key material, can be stored in an identity digital wallet.

The W3C has published the 'Verifiable Credentials Data Model v2.0' specification (VCDM) with data serialization in JSON-LD. In this charter, the VCDM defined concept of “verifiable credential” and “verifiable presentation” is captured using the wording "digital credential" and "digital presentation" respectively.

Goal

The SPICE WG will profile existing IETF technologies and address residual gaps that would enable their use in digital credentials and presentations based upon JWT and CWT technologies.

*	The JOSE WG is already standardizing a token format for unlinkability & selective disclosure in the form of JWP/CWP (draft-ietf-jose-json-web-proof <https://datatracker.ietf.org/doc/draft-ietf-jose-json-web-proof/> ). The SPICE WG will profile these token formats for use with digital credentials.
*	The OAUTH WG is already standardizing a token format for unlinkability & selective disclosure in the form of SD-JWT/SD-JWT-VC (draft-ietf-oauth-selective-disclosure-jwt <https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/>  and draft-ietf-oauth-sd-jwt-vc <https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/> ). The SPICE WG will define SD-CWT/SD-CWT-VC, analogs for these JWT-based tokens but based on CWT.

The SPICE WG will coordinate with the RATS, OAuth, JOSE, COSE and SCITT working groups that develop architecture, patterns and definition documents related to the identity and credential space. The SPICE WG will build on cryptographic primitives defined in the CFRG (e.g., BBS Signatures) and will not define novel cryptographic schemes.

The SPICE WG will not develop digital credentials for any particular use case. The SPICE WG will create general-purpose profiles which will enable credential issuers, holders and verifiers to easily build on existing IETF CWT and JWT technologies.

Program of Work

The SPICE WG is expected to develop:

*	An informational Architecture that defines the terminology (e.g., Issuer, Holder,Verifier, Claims, Credentials, Presentations) and the essential communication patterns between roles, such as credential issuance, where an issuer delivers a credential to a holder, and presentation, where a holder delivers a presentation to a verifier.
*	Proposed standard documents for digital credential profiles covering JWP and CWP (from JOSE) that enable digital credentials with unlinkability and selective disclosure. This work will include registering claims that are in the JWT and CWT registries to enable digital credentials to transition from one security format to another (i.e., JSON/CBOR).
*	A proposed standard document defining SD-CWT, a profile of CWT inspired by SD-JWT (from OAuth) that enables digital credentials with unlinkability and selective disclosure.
*	A proposed standard Metadata Discovery protocol using HTTPS/CoAP for CBOR-based digital credentials to enable the 3 roles (issuers, holders and verifiers) to discover supported protocols and formats for keys, claims, credential types and proofs. The design will be inspired by the OAuth "vc-jwt-issuer" metadata work (draft-ietf-oauth-sd-jwt-vc <https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/> ) which supports ecosystems using JSON serialization.

Milestones

*	04-2025 - Submit an informational Architecture document to the IESG for publication
*	10-2025 - Submit a proposed standard document covering a JWP/CWP profile for digital credentials to the IESG for publication
*	10-2025 - Submit a proposed standard document defining SD-CWT to the IESG for publication
*	03-2026 - Submit a document as a proposed standard covering Metadata Discovery to the IESG for publication

 <https://datatracker.ietf.org/doc/charter-ietf-spice/00-00/#introduction> Introduction

 <https://datatracker.ietf.org/doc/charter-ietf-spice/00-00/#goal> Goal

 <https://datatracker.ietf.org/doc/charter-ietf-spice/00-00/#program-of-work> Program of Work

 <https://datatracker.ietf.org/doc/charter-ietf-spice/00-00/#milestones> Milestones

 

 

 

 

From: Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries> > 
Sent: Monday, February 19, 2024 6:15 PM
To: Anthony Nadalin <nadalin@prodigy.net <mailto:nadalin@prodigy.net> >
Cc: Roman Danyliw <rdd@cert.org <mailto:rdd@cert.org> >; oauth <oauth@ietf.org <mailto:oauth@ietf.org> >
Subject: Re: [OAUTH-WG] FW: Call for consensus on SPICE charter

 

Inline:

On Mon, Feb 19, 2024, 7:34 PM <nadalin@prodigy.net <mailto:nadalin@prodigy.net> > wrote:

Orie, thanks for the response

 

I’m still confused on this charter proposal as I read this charter it is to create architecture, patterns and definitions for electronic credentials. The charter should be free of any technology including W3C, if people want clarity about what an electronic credential is then they can help out with the definitions since that is an output, so I don’t agree with how W3C is mentioned in the charter. 

 

As you pointed out below, W3C has defined credentials that are simply public keys bound to an origin (used as authenticators), and issuer signed claims about a subject (like JWTs)

 

So far the people who have been most active seem interested in generalizing the "signed public key and attributes" version of a digital credential. That definition lines up well with JWT and CWT with the cnf claim, and mDoc (as I understand it).

 

Most of the value W3C VC Data Model provides is focused on creating a structure for the claims that go in the credential. The security of W3C VCs based on JWT, SD-JWT, and COSE comes from the IETF drafts not from W3C.

 

Some of the protocol connection points also come from IETF documents, for example aud, nonce and cnf.

 

Most of the value JWT and CWT provide, is through the public claims and private claims in the associated IANA registries. For example, this is where the cnf claim that ties proof of possession to credentials is registered.

 

It's my understanding that mdocs have a namespace approach to claims as well.

 

Creating conventions for claims in a credential format is profiling. iso mdoc is a profile of COSE Sign1 in that sense.

 

You can consider the W3C documents that rely on JWT, CWT and COSE as profiles of those IETF standards. Instead of using JWT or CWT claimsets, the W3C uses JSON-LD.

 

A major reason for spice forming was to explore alternative claims structures, and to align CWT and JWT conventions for credentials that DO NOT require JSON-LD.

 

The way I read the charter is that interested parties will work on various profiles to map/profile various technologies to the create architecture, patterns and definitions documents, this will be done with various members that submit drafts.

 

Relative to WebAuthn what is produced is a credential, its not a JWT or SD-JWT but as the charter reads that is not the only credentials under consideration, if this is the case then the charter severely lacks clarity on what is the goal.

 

I don't think there is utility in IETF creating a profile for webauthn based credentials, because they are not meant to be presented beyond the origin they are bound to.

 

 

ISO is just another standards org, W3C, OIDF, OASIS, etc work with ISO with no issues, I assume profile will be created by various members that submit drafts, if no one is interested in mDL/ISO then that’s fine.

 

I still think this charter needs more clarity as I point out

 

Can you suggest text?

 

 

From: Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries> > 
Sent: Friday, February 16, 2024 10:11 AM
To: nadalin@prodigy.net <mailto:nadalin@prodigy.net> 
Cc: Roman Danyliw <rdd@cert.org <mailto:rdd@cert.org> >; oauth <oauth@ietf.org <mailto:oauth@ietf.org> >
Subject: Re: [OAUTH-WG] FW: Call for consensus on SPICE charter

 

Hey Tony,

 

On Thu, Feb 15, 2024 at 1:36 PM <nadalin@prodigy.net <mailto:nadalin@prodigy.net> > wrote:

1) Do you support the charter text? Or do you have objections or blocking concerns (please describe what they might be and how you would propose addressing the concern)?

Not sure I support at this point, I understand the need for an architecture document with patterns and definitions, etc. 

There is a lot of work going on outside the IETF in this area such as the mDL work in ISO that already has patterns and definitions along with credential formats (mdoc)  and transports (ble/http/nfc). I don’t believe the IETF should ignore these efforts since most of the driving licence and passport communities/companies are adopting this as one of the standards that issuers and verifiers will use. The same is true for W3C WebAuthn.


WebAuthN cannot produce standard digital signatures, and so it cannot be used to produce standard digital credentials (for example it cannot be used to produce JWT or SD-JWT).
It could produce authentications for public keys that could be bound to credentials, but because of the origin binding in WebAuthN, this would not fit well with the "audience" typically used for digital credentials (usually there is no audience)

You might find this thread on possible relation between mDoc and CWT interesting:

https://mailarchive.ietf.org/arch/msg/spice/xiRpmd-Bexv94qentlGg1Snjw1A/


The architecture, patterns and definitions should be free from technology, I don't know why W3C is mentioned in the introduction as the only technology, this should not be in the introduction but along with other technologies such as mDL/mdoc, webauthn, etc when describing profiles. As the goal would be for interested parties to produce profiles of other technologies to fit the architecture document with patterns and definitions.


W3C is mentioned because some W3C members asked for a term other than "Verifiable Credentials" to be used... and they asserted the "Verifiable Credentials" implies the JSON-LD data model developed in W3C.

ISO was not emphasized because formal coordination would require contribution from ISO experts, and we have had relatively low engagement from them.
 


I believe that the WG if formed should also think about holder verification and patterns and attestations that can be used.

 

Interesting. I think this is covered under the metadata discovery deliverable, but if you feel it could be made more clear, please send text.

 

Also there needs to be a notion of a "reader/wallet/etc" that can potentially store credentials (not necessarily the user or verifier) and release/store credentials upon "user" consent.


This sounds like an application to me.
How do you see this related to "credential formats" or "issuer/holder/verifier metadata"?
 



There are other models than the 3 party that VCs use, so these also need to be considered in the architecture,  patterns and definitions documents to enable profiles for other technologies.


Agreed, OAuth JWTs/SD-JWTs, and ISO mDocs are examples we have discussed.
Are there others you would like to see considered?  



I believe in the 1st 3 items in Goals but  I don't believe it would be in the best interest to define a metatdata protocol, as this sounds like this would be a protocol for obtaining DID documents, there are already many protocols out there for metadata retrieval, not sure there is a need for another one, if one is needed for DIDs then that may be better done in W3C as this does not seem to fit well with the charter


Discovering attestations for wallets seems to fit here, why should URLs or URNs (DIDs) be specifically marked as out of scope?

For consideration, JWK / COSE Key Thumbprints are good alternatives to DIDs which have been standardized / are being standardized in the IETF:

- https://datatracker.ietf.org/doc/draft-ietf-cose-key-thumbprint/
 


This charter seems to be very scoped to W3C technology, I understand that interested parties will have to contribute if they want to have other technologies included but the charter in general does not seem to allow this, so removing specific technology will allow this to happen.

 

We chose to use "Digital Credential" and "Digital Presentation" specifically to keep the door open to CWT and COSE Sign1 structures which are used in IETF and ISO.
 



I would be happy to give provide specific text changes to the charter.


I think it would be great if you could offer text that refines your comment about format support, and holder/wallet metadata / attestations.
 



2) If you do support the charter text:


3) Are you willing to author or participate in the developed of the WG drafts?

yes

• Are you willing to review the WG drafts?

yes

• Are you interested in implementing the WG drafts?

I'm willing to see how we can use these outputs with the other industry technologies.


Thank you for your comments.
 



_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org> 
https://www.ietf.org/mailman/listinfo/oauth




 

-- 

 

ORIE STEELE
Chief Technology Officer
www.transmute.industries <http://www.transmute.industries> 

 <https://transmute.industries/> 




 

-- 

 

ORIE STEELE
Chief Technology Officer
www.transmute.industries <http://www.transmute.industries> 

 <https://transmute.industries/>