Re: [Privacy-pass] Working group last Call for batched Tokens

Tommy Pauly <tpauly@apple.com> Mon, 08 April 2024 17:45 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90C77C14CE33 for <privacy-pass@ietfa.amsl.com>; Mon, 8 Apr 2024 10:45:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.473
X-Spam-Level:
X-Spam-Status: No, score=-4.473 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.08, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id feXiey5sF7L6 for <privacy-pass@ietfa.amsl.com>; Mon, 8 Apr 2024 10:45:34 -0700 (PDT)
Received: from ma-mailsvcp-mx-lapp01.apple.com (ma-mailsvcp-mx-lapp01.apple.com [17.32.222.22]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4932C15107A for <privacy-pass@ietf.org>; Mon, 8 Apr 2024 10:45:29 -0700 (PDT)
Received: from rn-mailsvcp-mta-lapp02.rno.apple.com (rn-mailsvcp-mta-lapp02.rno.apple.com [10.225.203.150]) by ma-mailsvcp-mx-lapp01.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPS id <0SBM0019IXBRWC30@ma-mailsvcp-mx-lapp01.apple.com> for privacy-pass@ietf.org; Mon, 08 Apr 2024 10:45:28 -0700 (PDT)
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-04-08_15,2024-04-05_02,2023-05-22_02
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=nLz0vaHgdvwqnhCpHvUimGluPD2MmcPEDXWRcAcoeyk=; b=c9jaNSM+ahEIib7I/+WVHUmflKkZgUZMyZFHPFkCRasfl/P8yXj1gX36r/WOo/56TZCE dGTwCLNZA4T/UeS8YSqZ1et/kOcZFLXCpFQ7mPnWGd3XaA/FPuHdSyQfgL7Sx72ZcGZ3 ZCHaXlckKMnCLGR/+NZSlLKFetGjox/8lchq+HpQQuBtVepTQ6PJP0L0dir2UwrU2b68 uZdYunIQqAOWp3tTvrJJ3Hr/aHXrXZYUyvI7sCDTYbMtuEXlLfCV/Rwru1KLrXBiCPA4 Pc/Vexe9XTn5gKXBOFLEbcEHT+q67bFaqYBAzN6UV8pqsosADs4J7hQyH6JlLcxfYNk4 bQ==
Received: from rn-mailsvcp-mmp-lapp02.rno.apple.com (rn-mailsvcp-mmp-lapp02.rno.apple.com [17.179.253.15]) by rn-mailsvcp-mta-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPS id <0SBM004LKXBRIT51@rn-mailsvcp-mta-lapp02.rno.apple.com>; Mon, 08 Apr 2024 10:45:27 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp02.rno.apple.com by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) id <0SBM00P00X9SH000@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Mon, 08 Apr 2024 10:45:27 -0700 (PDT)
X-Va-A:
X-Va-T-CD: a76e746662f71e8f03430028ee5d52f3
X-Va-E-CD: 5c92d29e7745b5f8a4f670f4b245067f
X-Va-R-CD: 01f945e4c02e674a1ab265d5affe99e2
X-Va-ID: 822ed9ae-6532-4d12-8fc5-dcc87d90f6e9
X-Va-CD: 0
X-V-A:
X-V-T-CD: a76e746662f71e8f03430028ee5d52f3
X-V-E-CD: 5c92d29e7745b5f8a4f670f4b245067f
X-V-R-CD: 01f945e4c02e674a1ab265d5affe99e2
X-V-ID: 30cb6bed-053b-4295-a084-18c0f4d428a7
X-V-CD: 0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.1011,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-04-08_15,2024-04-05_02,2023-05-22_02
Received: from smtpclient.apple ([17.230.165.205]) by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.23.20230328 64bit (built Mar 28 2023)) with ESMTPSA id <0SBM004FIXBR0T00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Mon, 08 Apr 2024 10:45:27 -0700 (PDT)
From: Tommy Pauly <tpauly@apple.com>
Message-id: <66232608-EF93-4C99-A0E5-019A56F4DFE6@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_BBFDA0CC-60BB-4714-8F89-E4860CA4EB91"
MIME-version: 1.0 (Mac OS X Mail 16.0 \(3774.500.171.1.1\))
Date: Mon, 08 Apr 2024 10:45:20 -0700
In-reply-to: <5506BC20-3DE0-46AC-9701-3223F197AB23@heapingbits.net>
Cc: Joseph Salowey <joe@salowey.net>, Raphael Robert <ietf@raphaelrobert.com>, Steven Valdez <svaldez=40google.com@dmarc.ietf.org>, privacy-pass@ietf.org
To: Christopher Wood <caw@heapingbits.net>
References: <15E0A5B4-C2D7-46E7-A82E-DC15F34323D5@apple.com> <5506BC20-3DE0-46AC-9701-3223F197AB23@heapingbits.net>
X-Mailer: Apple Mail (2.3774.500.171.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/UTixJFCgOftRGs8S_ulSxlfw94I>
Subject: Re: [Privacy-pass] Working group last Call for batched Tokens
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Privacy Pass Protocol <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Apr 2024 17:45:38 -0000


> On Apr 8, 2024, at 9:50 AM, Christopher Wood <caw@heapingbits.net> wrote:
> 
> 
> 
>> On Apr 8, 2024, at 11:36 AM, Tommy Pauly <tpauly@apple.com> wrote:
>> 
>> Also chiming in for a review — I just read through the draft and it looks good to me. I didn’t see any particular flaws that I would say need addressing before publication. I filed one very minor editorial issue https://github.com/ietf-wg-privacypass/ietf-draft-privacypass-batched-tokens/issues/8
>> 
>> I did have one overall question about our approach to token types and batching: this new batched VOPRF allocates a new token type, although my understanding is that the redemption step doesn’t necessarily need to know anything about it being batched in order to validate the token. To what degree do we want changes to the issuance that don’t impact the nature of the token upon redemption to be reflected in the token type vs some other difference in the request (such as media type, etc, etc)? Is there a security reason that the redeemer needs to know?
> 
> The redeemer does not need to know that issuance was fetched using a batched version of the protocol. However, since we chose to reuse the TokenRequest structure for issuance, we needed a distinguisher for the issuer to know that a batch was being requested. That ended up being the token type. We could have introduced a new BatchTokenRequest structure, with a new media type, for issuance, but that didn’t happen. I recall having this discussion at some point in the past, but I didn’t look to where it took place (on the list, GitHub, or during a meeting). In any case, we can change this, but I don’t feel strongly about it, except maybe that knowing a client supports batched and non-batched issuance could be a way to partition the client anonymity set for a redemption context. (Okay, maybe that’s a reason to change!)

Right — if this is a way to segment clients, it’s not great. I’m thinking a bit of the precedent we’re setting here, too. If we end up always exposing a change in the issuance path as a new type to the redemption side, we’re exposing new bits unless all clients are doing the same approach. If this works equally well with using existing token types and using a different media type to the issuer, then that may be a better solution.

Tommy

> Best,
> Chris 
> 
>> 
>> Tommy
>> 
>>> On Apr 7, 2024, at 9:02 PM, Joseph Salowey <joe@salowey.net> wrote:
>>> 
>>> RIght now we only have one response to the last call which is not enough to call consensus on.   It would be good to have a draft that is not expired, but I also think before we can continue a consensus call we need a draft with all the outstanding changes as well.  
>>> 
>>> Thanks,
>>> 
>>> Joe
>>> 
>>> On Wed, Mar 20, 2024 at 3:37 AM Raphael Robert <ietf@raphaelrobert.com <mailto:ietf@raphaelrobert.com>> wrote:
>>>> As soon as that issue is resolved I’ll make one more editorial pass before I cut a new draft. I’ll announce it here.
>>>> 
>>>> Raphael
>>>> 
>>>>> On 20. Mar 2024, at 06:23, Steven Valdez <svaldez=40google.com@dmarc.ietf.org <mailto:40google.com@dmarc.ietf.org>> wrote:
>>>>> 
>>>>> I think this draft looks mostly good and I support it going to the IESG. There is one outstanding issue #6 <https://github.com/ietf-wg-privacypass/ietf-draft-privacypass-batched-tokens/issues/6> (I submitted and forgot to follow up on) regarding adding the VOPRF variant as a defined type since we're relying on that variant for PST. I can try to get a PR for that submitted, though not sure what the ordering between the draft being expired, the WGLC and cutting a new draft should look like?
>>>>> 
>>>>> -Steven
>>>>> 
>>>>> On Mon, Mar 11, 2024 at 2:47 PM Joseph Salowey <joe@salowey.net <mailto:joe@salowey.net>> wrote:
>>>>>> This is the working group last call for Batched Token Issuance Protocol (https://datatracker.ietf.org/doc/draft-ietf-privacypass-batched-tokens/).  Please review the document and indicate if it is ready to forward to the IESG by posting comments to this thread.  The internet draft is about to expire but should still be accessible.  Please send your comments by March 26, 2024.  
>>>>>> 
>>>>>> Thanks,
>>>>>> 
>>>>>> Joe and Ben
>>>>>> -- 
>>>>>> Privacy-pass mailing list
>>>>>> Privacy-pass@ietf.org <mailto:Privacy-pass@ietf.org>
>>>>>> https://www.ietf.org/mailman/listinfo/privacy-pass
>>>>> 
>>>>> 
>>>>> --
>>>>> 
>>>>>  Steven Valdez |	 Chrome Privacy Sandbox |	 svaldez@google.com <mailto:svaldez@google.com> |	 Cambridge, MA
>>>>> -- 
>>>>> Privacy-pass mailing list
>>>>> Privacy-pass@ietf.org <mailto:Privacy-pass@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/privacy-pass
>>>> 
>>> -- 
>>> Privacy-pass mailing list
>>> Privacy-pass@ietf.org
>>> https://www.ietf.org/mailman/listinfo/privacy-pass
>>