Re: [Rats] [External Sender] Discussion paper regarding RATS & OpenID-Connect -- RE: Adhoc meeting at IETF 117 for anyone interested in attested Open-ID/Connect and Oauth2

"Smith, Ned" <ned.smith@intel.com> Tue, 22 August 2023 16:16 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B8B1DC15155A for <rats@ietfa.amsl.com>; Tue, 22 Aug 2023 09:16:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ty-dpYLnMg-Q for <rats@ietfa.amsl.com>; Tue, 22 Aug 2023 09:16:49 -0700 (PDT)
Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34774C151544 for <rats@ietf.org>; Tue, 22 Aug 2023 09:16:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1692721009; x=1724257009; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=LT5qjUTEjzgzfovp6duTB8yArUNqmyfDPxvqfT71BUQ=; b=N22dgPgLDZWzEXQBItXjt/DYu9HcGH2vXrBVEKE2/4foIgd04qPOxdnP I77uKSBd+As1Gsj4KJPBhPBt3USPpSV+u9IaJWASsxR1ngDlP5cTWS5US RA0GW54OAmWuNNRL30GjAGswBcKK+qOpzS7uHL3Rx+pojZJBfq3oGue0Q ldVDsnKc9B/AkefFsx8IyLpfoo9izQ8z7AYlH5kj7p9+TkQC2i1Pw1aEa sIOQ/A27aJmxo1idYzxocpiJ8KI2Y5hIIeQrGHGKMu9c+AVHk2zOVaYSR amTGyRosHbxwF/hndJxVN9S28FgtOO5WFIT8OM5J34A92ICAdLgrj0LOX A==;
X-IronPort-AV: E=McAfee;i="6600,9927,10809"; a="437857181"
X-IronPort-AV: E=Sophos;i="6.01,193,1684825200"; d="scan'208";a="437857181"
Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Aug 2023 09:14:00 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=McAfee;i="6600,9927,10809"; a="713223619"
X-IronPort-AV: E=Sophos;i="6.01,193,1684825200"; d="scan'208";a="713223619"
Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga006.jf.intel.com with ESMTP; 22 Aug 2023 09:11:30 -0700
Received: from orsmsx601.amr.corp.intel.com (10.22.229.14) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27; Tue, 22 Aug 2023 09:11:30 -0700
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx601.amr.corp.intel.com (10.22.229.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.27 via Frontend Transport; Tue, 22 Aug 2023 09:11:30 -0700
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.168) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.27; Tue, 22 Aug 2023 09:11:30 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PHog9+hHk1i4PFEcbYM6FSfxfYn/GOiBFJeXBpBQV7m237QWVObKMs//ew0NH2NB0PNar8e4o7G9Lm7LfhRWemFEr3lyG8woe2cifuidR8FbCW+q6oNf+3scu9AD/uWOuz3NPkcetTyCQTxsD7Mhz6WAPXjucpRVWP+UzukmM3vT+X8a7ulr5Y0vuwKiMtot5vcQlAqziBDQiyc6+razBpLJk77nN+xIwriw4yZjLPyMv4H7E24ZdxGFK5FK3sqAIzq5GvX2TIiNkB08NQW5bonawlROLuoZ908sr3tWVTbXM4rzGB7eDw1DQ5RM/EMyOXWzdo3iUvzODmYgTL0t+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LT5qjUTEjzgzfovp6duTB8yArUNqmyfDPxvqfT71BUQ=; b=YLWSg8TWUFkRdZEEPzG51fBcKMjZRa66YMLVn9hPEdchsv0B2yzp+ig35ytSSWsAfJBEpgNfWPHjgo+NKOzTtF8caKcTn/jxyL7CV1Nthl1zkNvIZXE4mMRCEYZy80EovjCN7H92c2jhc2C4u5fAPMofwW21NY+Q8uazP291oluPcePSs2KA0O0353WqLfQdKFwRGMcbhGp5OwOokLyBy1blIJw5GYrzWecJrr1izS7KaJit7Vm9JXP4Hx+VMkaZw4WkA8Fh2345DBzcQaDRqcIfYMb4QFR20ararFYtZIVlMyvkDRzXet54cWuI8btpIPBb0XgfdcfhUaaN/PCXbQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from PH0PR11MB5176.namprd11.prod.outlook.com (2603:10b6:510:3f::5) by DM6PR11MB4723.namprd11.prod.outlook.com (2603:10b6:5:2a0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6699.24; Tue, 22 Aug 2023 16:11:27 +0000
Received: from PH0PR11MB5176.namprd11.prod.outlook.com ([fe80::360d:b35b:51e7:f5af]) by PH0PR11MB5176.namprd11.prod.outlook.com ([fe80::360d:b35b:51e7:f5af%3]) with mapi id 15.20.6699.022; Tue, 22 Aug 2023 16:11:27 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: Thomas Hardjono <hardjono@mit.edu>, George Fletcher <george.fletcher@capitalone.com>
CC: "rats@ietf.org" <rats@ietf.org>, "orie@transmute.industries" <orie@transmute.industries>, "pamela.dingle@microsoft.com" <pamela.dingle@microsoft.com>, "mprorock@mesur.io" <mprorock@mesur.io>, "michael_b_jones@hotmail.com" <michael_b_jones@hotmail.com>, Justin Richer <jricher@mit.edu>, "hannes.tschofenig@gmx.net" <hannes.tschofenig@gmx.net>, "ncamwing@cisco.com" <ncamwing@cisco.com>, "steve.venema@forgerock.com" <steve.venema@forgerock.com>
Thread-Topic: [External Sender] Discussion paper regarding RATS & OpenID-Connect -- RE: Adhoc meeting at IETF 117 for anyone interested in attested Open-ID/Connect and Oauth2
Thread-Index: AQHZywfNzcL1DiKzp0O3353my/eF7a/1eguAgADKEwCAADatAP//oGcA
Date: Tue, 22 Aug 2023 16:11:27 +0000
Message-ID: <5E2D942A-EF4E-463E-9305-F3B971A6D7F8@intel.com>
References: <E9306E0C-4E8C-46FD-B4D2-B790B41260E3@intel.com> <0c25a9d8469f48dabea2eb2f45c867a7@oc11expo23.exchange.mit.edu> <CAJnLd9LrtVTq3Cd9paaGDQbgt_k-p=uo2_UOzoHPGYT4y7Njig@mail.gmail.com> <c74fdc30a7894876bf8faa85e64d02f4@oc11expo23.exchange.mit.edu>
In-Reply-To: <c74fdc30a7894876bf8faa85e64d02f4@oc11expo23.exchange.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.76.23081101
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB5176:EE_|DM6PR11MB4723:EE_
x-ms-office365-filtering-correlation-id: 53b15b6d-4010-4bd8-75bc-08dba32a709d
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5176.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(396003)(136003)(39860400002)(376002)(346002)(366004)(1800799009)(186009)(451199024)(54906003)(76116006)(66476007)(66446008)(66556008)(64756008)(6512007)(316002)(66946007)(82960400001)(91956017)(110136005)(966005)(8676002)(8936002)(2616005)(4326008)(36756003)(41300700001)(478600001)(122000001)(19627235002)(71200400001)(45080400002)(38100700002)(38070700005)(6486002)(53546011)(6506007)(83380400001)(30864003)(2906002)(7416002)(86362001)(5660300002)(26005)(33656002)(129350200041)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <7680014A49B53142860D63689D3B7A7A@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5176.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 53b15b6d-4010-4bd8-75bc-08dba32a709d
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Aug 2023 16:11:27.6010 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: b2ZbfY7cViPrWYGdmFDAC5Yfdep8MyhZwtbH+mkFifOxShXPjDCAbMQdEM54UgsSiRNtvRPa7nXI6yMP1w9coA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4723
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/5lAkfnuLGusMgpySgBUoRpoRkIg>
X-Mailman-Approved-At: Tue, 22 Aug 2023 09:17:27 -0700
Subject: Re: [Rats] [External Sender] Discussion paper regarding RATS & OpenID-Connect -- RE: Adhoc meeting at IETF 117 for anyone interested in attested Open-ID/Connect and Oauth2
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Aug 2023 16:16:53 -0000

--snip--
>>> For me a couple of interesting questions come to mind.
>>> 1. Does the RP need to directly integrate with the Verifier in some way 
>>> to get the attestation result or could it trust an attestation result provided by the OP?
>This is a great question. The way it is shown in Figure-2, the RP0 and the Verifier are distinct, but they could presumably be 
> placed together.
> With regards "trust" there is an assumption (though not explicit in in RFC9334) that the Verifier itself is "safe" and "trusted to > appease the evidence" (i.e. the Verifier has not been compromised and not manipulating the appraisal Results).
>
The RP and Verifier do need to agree on a format and representation for Attestation Results (AR). RFC9334 documents the AR flow from Verifier to RP, but doesn't describe how RP tells the Verifier what AR format to use and what Attester attributes are meaningful to the RP for making a decision.

All of the RATS roles can be combined / separated to achieve a particular deployment goal. If separated, the method by which they authenticate / trust each other is left out of scope for RFC9334. It could be based on provisioning (say of trust anchors), or it could depend on recursive application of attestation, or something else.

The AR_Token is intended to be a representation of Attestation Results that the OP, AS, or other relying party accepts as having the right set of Attester attributes necessary to decide whether to proceed or not. 

> Also, Fig-2 assumes that the OP is "safe and trusted".
>>> 2. I expect the OP will also want to validate the device evidence so do most 
>>> flows need to have the evidence evaluated twice? or is once sufficient?
> So, I think this is one of the design questions. Functionally, the Verifier should be compartmentalized away from the OP 
> function. In this case the OP is reliant on the Verifier for a locally-issued appraisal Result. 
> (Although out of scope, the OP machine could be an Attester in its own right).
>
The AR_Token, most likely, will have an expiration date. As long as the token hasn't expired, it could be reused.
However, there is the possibility that the Attester state is dynamic, e.g., a sw update was pushed, the update might trigger 
re-issuance of the AR_Token, even though the previous token didn't expire. That presents an interesting consistency
question. But likely not a security concern if the "RP" decision makers update their policies in a timely way. If the stale AR_Token
is used, access is denied until the re-issued token propogates.

>>> I'm wondering if it's possible to define a scope 'rats_results' that would be understood by the OP 
>>> and the attestation results could be returned in the id_token. 
>
> Would this be a mismatch of functions? id_tokens are for humans.
> Alternatively, could the id_token has a new flag that says this "human needs device verification to be performed".
>
W3C verifiable credentials has the notion of a presentation layer. This could be for humans or machines. 
Possibly, it makes sense for the AR_Token to have a presentation layer that is appropriate for both humans and machines?
That way, if in OIDC / OAuth flows that involve humans, there would be an attestation results expression that is meaningful
to humans. Likewise, for machine-machine flows, the AR-Token might contain something like AR4SI (https://datatracker.ietf.org/doc/draft-ietf-rats-ar4si/) or EAR (https://datatracker.ietf.org/doc/draft-fv-rats-ear/).
It might be better to think of Attestation Results as a distinct token, rather than a subset of an ID_Token or an Access_Token
since each token type has a different objective. Given an endpoint (relying party) has multiple objectives, receiving multiple tokens may make sense. Binding the various tokens becomes a relevant security consideration at that point.
--snip--

________________________________________
From: George Fletcher [george.fletcher@capitalone.com <mailto:george.fletcher@capitalone.com>]
Sent: Tuesday, August 22, 2023 7:37 AM
To: Thomas Hardjono
Cc: rats@ietf.org <mailto:rats@ietf.org>; orie@transmute.indu <mailto:orie@transmute.indu>stries; pamela.dingle@microsoft.com <mailto:pamela.dingle@microsoft.com>; mprorock@mesur.io <mailto:mprorock@mesur.io>; michael_b_jones@hotmail.com <mailto:michael_b_jones@hotmail.com>; Justin Richer; hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>; Ned Smith (ned.smith@intel.com <mailto:ned.smith@intel.com>); ncamwing@cisco.com <mailto:ncamwing@cisco.com>; steve.venema@forgerock.com <mailto:steve.venema@forgerock.com>
Subject: Re: [External Sender] Discussion paper regarding RATS & OpenID-Connect -- RE: Adhoc meeting at IETF 117 for anyone interested in attested Open-ID/Connect and Oauth2


Thanks for the discussion paper. I do think this is interesting work. In the past I've defined a private extension of OpenID Connect that was for "authenticating" devices rather than people so I agree that there is a need for this general functionality.


A couple of points on the OpenID Connect flow. The flow described is more akin to the "implicit flow" which is basically deprecated except for a few special use cases. In general, what the RP gets back from the OP after redirecting the user to the OP to authenticate is an 'authorization_code'. This code is then exchanged via a direct connection between the RP and the OP to obtain the id_token and access_token. Also, while in some deployments the token introspection endpoint will return user data, the more correct endpoint is the /userinfo endpoint defined by OpenID Connect.


For me a couple of interesting questions come to mind.
1. Does the RP need to directly integrate with the Verifier in some way to get the attestation result or could it trust an attestation result provided by the OP?
2. I expect the OP will also want to validate the device evidence so do most flows need to have the evidence evaluated twice? or is once sufficient?


I'm wondering if it's possible to define a scope 'rats_results' that would be understood by the OP and the attestation results could be returned in the id_token. This would just be a profile of OpenID Connect defining the new scope. Since the OP knows the RP making the request, it could ensure the Verifier applies the correct policy when evaluating the evidence. I realize this might not cover all use cases.


Thanks,
George


On Mon, Aug 21, 2023 at 7:39 PM Thomas Hardjono <hardjono@mit.edu <mailto:hardjono@mit.edu><mailto:hardjono@mit.edu <mailto:hardjono@mit.edu>>> wrote:


Folks,


Following from the sidebar meeting at IETF117, we have written a short discussion paper (PDF attached).


(The discussion paper is also available here: https://urldefense.com/v3/__https://shorturl.at/mnO37__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSb2bWmOXQ$ <https://urldefense.com/v3/__https://shorturl.at/mnO37__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSb2bWmOXQ$> )


The aim of the short paper is to explain better the motivations and use-cases for exploring OIDC as a mechanism to deliver RATS-based device-attestations.


We would appreciate comments & suggestions for going forward.




Best


Thomas & Ned








________________________________________
From: scim [scim-bounces@ietf.org <mailto:scim-bounces@ietf.org><mailto:scim-bounces@ietf.org <mailto:scim-bounces@ietf.org>>] on behalf of Smith, Ned [ned.smith@intel.com <mailto:ned.smith@intel.com><mailto:ned.smith@intel.com <mailto:ned.smith@intel.com>>]
Sent: Wednesday, August 9, 2023 5:23 PM
To: oauth@ietf.org <mailto:oauth@ietf.org><mailto:oauth@ietf.org <mailto:oauth@ietf.org>>; rats@ietf.org <mailto:rats@ietf.org><mailto:rats@ietf.org <mailto:rats@ietf.org>>; teep@ietf.org <mailto:teep@ietf.org><mailto:teep@ietf.org <mailto:teep@ietf.org>>; suit@ietf.org <mailto:suit@ietf.org><mailto:suit@ietf.org <mailto:suit@ietf.org>>; scim@ietf.org <mailto:scim@ietf.org><mailto:scim@ietf.org <mailto:scim@ietf.org>>
Subject: Re: [scim] Adhoc meeting at IETF 117 for anyone interested in attested Open-ID/Connect and Oauth2


Folks,
We had a side-bar meeting at the IETF117 last week in San Francisco, regarding the possible use of OpenID-Connect/OAuth2.0 as a mechanism to deliver RATS-based device-attestation.


The meeting was attended by about 15 people, mostly from the Identity community (folks who regularly attend OAuth2.0, OIF and IWW).


From the start of the discussion, it was clear that there was some terminology mismatch between the various folks & communities.


For example, in the OAuth2.0 language the word "Client" is typically used to mean the service which is being driven by the user (e.g., to authorize access to a Resource Server (RS), which is typically also a RESTful web-based service).


However, in RATS and TCG language, the "Client" often means the hardware device (in the possession of a user) which will generate evidence regarding the composition (hardware, firmware, software) of the device.


Some folks also mentioned interesting use-cases that the RATS community perhaps have not previously considered. For example, prior to connecting to the RS it is possible that the OAuth2.0 Client (e.g., hosted by a provider) may seek device-attestations from RS machine itself (and vice versa).


All in all, we believe that a productive next step would be a discussion on the RATS mail-list regarding common Terminology, something that is meaningful to the RATS community as well as the broader IETF community.


There are 3 I-Ds that are in early stages that seem to be describing aspects of a comprehensive approach to attestation for identity infrastructures:
https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-looker-oauth-attestation-based-client-auth/__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSbcXGWAaw$ <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-looker-oauth-attestation-based-client-auth/__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSbcXGWAaw$> ,
https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-tschofenig-oauth-attested-dclient-reg/__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSZroxM0bQ$ <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-tschofenig-oauth-attested-dclient-reg/__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSZroxM0bQ$> ,
https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-sh-rats-oidcatt/__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSZOfS7UfQ$ <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-sh-rats-oidcatt/__;!!FrPt2g6CO4Wadw!NnwooY8NaoY0bnR0dJsNZS1hv_XY7Ye5vraIb7WP-UvCNcshWwEpBTfhpBOiZAR8ZY0PcIQYSG0BUc5KLSZOfS7UfQ$>
Referring to these drafts for context (and possible disagreement) may help with the conversation.


I’m cross posting to several working groups, but the discussion thread will be exclusive to the RATS WG (rats@ietf.org <mailto:rats@ietf.org><mailto:rats@ietf.org <mailto:rats@ietf.org>>).


Best
Ned & Thomas


________________________________




The information contained in this e-mail is confidential and/or proprietary to Capital One and/or its affiliates and may only be used solely in performance of work or services for Capital One. The information transmitted herewith is intended only for use by the individual or entity to which it is addressed. If the reader of this message is not the intended recipient, you are hereby notified that any review, retransmission, dissemination, distribution, copying or other use of, or taking of any action in reliance upon this information is strictly prohibited. If you have received this communication in error, please contact the sender and delete the material from your computer.