Re: [saag] Call for consensus on SPICE charter
Ira McDonald <blueroofmusic@gmail.com> Fri, 23 February 2024 14:48 UTC
Return-Path: <blueroofmusic@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACFC8C14F5EA; Fri, 23 Feb 2024 06:48:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.103
X-Spam-Level:
X-Spam-Status: No, score=-7.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j6LGBu1cOM8q; Fri, 23 Feb 2024 06:48:08 -0800 (PST)
Received: from mail-ua1-x930.google.com (mail-ua1-x930.google.com [IPv6:2607:f8b0:4864:20::930]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7173C14F5E4; Fri, 23 Feb 2024 06:48:08 -0800 (PST)
Received: by mail-ua1-x930.google.com with SMTP id a1e0cc1a2514c-7d5bbbe57bbso523223241.1; Fri, 23 Feb 2024 06:48:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1708699687; x=1709304487; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Lhpm5bi7pQ8lo5Vxg1JwITrY90nJhUPqMDpL5aFluUU=; b=V5Y5ewFZaboY9g70u5rqAAVSF5xfMkjdf400pmD5q0j8Mnpc2fV1J1sacH9W0ADKDT 7tDnmGrH8GKz2tO1bwFNh9E7PKsRnT0Mg/ObdvrwZe14dpjgxI/58m5WghoEID42lInM 9joZgRuVnFXKrdu9XkgW5TUyajL/WoPZzpvb0za262Kzgw8lo7qWykUhYlLfGiGMRqWe 3ttxv58Qblyq3vkKBs4v/Z/Yuy52SVSDpjtCOY/iEKx1CoEieVicfYHlaEYfpyy0myoa jmJUWZARy5kbT+1sd9E6L63O9tecvmm8RyxVp/CsqMcWQ6CzdnFO2Pe2+Ge6Cc/iwLLD Gf+w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708699687; x=1709304487; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Lhpm5bi7pQ8lo5Vxg1JwITrY90nJhUPqMDpL5aFluUU=; b=v1pFnqRWoW6IwdUSO/k4+jI3mWCUnnHmeD6H0Sd1pzkwndlgfZE5SFGuYYQbnh/8Fp kcQCIBRgbQRX+Q8OrVamiZvi36tyEOguzMBO6bpLOCGdjGjTbJRFX6ajJyyDDiOJAUW7 U2xTLd2uwtpBCSsD9mKxoz+YwEJ0Ik4VLUZTTGv9dTOmavK5cbalFtYL6pcWlq4Gahd9 Ug/TbuMoNd2cufz7sjoWYciz2iHPfL3+wme3E97zhyI0PBYSkRVeFmhfv3SZBAEy6bfh Ald/AbanmoszP7AWW+7Xn7jWg8HwheNZm1oyW8F78Fxfo0Qytmw72OECMcmeMUpapZlk 161w==
X-Forwarded-Encrypted: i=1; AJvYcCVIinfF34cU7hxbksnAZgY3KXRfyLepDeyv/7fEqGoBU7FQRaPCD+hh/0esOy3c6xeIHgb6+nsm2MYwfeny
X-Gm-Message-State: AOJu0Yzcjltn6likA9mF625yiSp5FdD02cKhdk8+w5xN5ffvrYs4K0en YPVMjnTnLsZXE4y5m0vbLveldBZloJoXApQY6VoWie/aGRzO1FcQ+5KA9VETL+lBvjHNmaQTiv7 iPCn6fnd6t188FIo0G2vjv/sBhgE=
X-Google-Smtp-Source: AGHT+IFJfG/ZImFhddY1MG9h8k5r3gd30OySLanjkFBRoP2O2nX7Ak8h6gxQf+Dvu+o0Bgi7BPYWMRuDEFVyJiWiP3E=
X-Received: by 2002:a1f:d345:0:b0:4bd:32c9:acb with SMTP id k66-20020a1fd345000000b004bd32c90acbmr69708vkg.7.1708699687386; Fri, 23 Feb 2024 06:48:07 -0800 (PST)
MIME-Version: 1.0
References: <SJ0PR02MB74391502B5451B27457FE12DB74E2@SJ0PR02MB7439.namprd02.prod.outlook.com> <B85451AF-814D-4FFE-A593-E733572FA3EB@gmail.com> <e68d0218-82d0-b21a-a048-8cd7ad38e0cf@free.fr> <CAN40gSuU94OEKdueKd48oMsycLk2e3g2RTgpNPbRKpR8DitDeg@mail.gmail.com> <94765b81-2285-fa3c-4ab0-27a777725807@free.fr>
In-Reply-To: <94765b81-2285-fa3c-4ab0-27a777725807@free.fr>
From: Ira McDonald <blueroofmusic@gmail.com>
Date: Fri, 23 Feb 2024 09:47:48 -0500
Message-ID: <CAN40gSvNjOGELBn0_mmDXbJ5kxdfE0ZNJ6s8oPtQdyStmG8Tig@mail.gmail.com>
To: Denis <denis.ietf@free.fr>, Ira McDonald <blueroofmusic@gmail.com>
Cc: spice@ietf.org, saag <saag@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e50b7e06120da59a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/c8Tcl1Dl7o4AknSHQ3gSC3bjsRo>
Subject: Re: [saag] Call for consensus on SPICE charter
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2024 14:48:12 -0000
Hi Denis, Thanks. I stand corrected. I still suggest that SPICE folks inform themselves about IETF RATS WG activities and documents, including of course EAT (Entity Attestation Token) in the RFC Editor queue since December 2023. https://datatracker.ietf.org/doc/draft-ietf-rats-eat/ RATS operations, terminology, and architecture are already in use in IETF SUIT WG (S/W Update), IETF TEEP WG (TEE Provisioning, spanning several CPU architectures), and others, for claims that include identity and evidence about validity. Cheers, - Ira *Ira McDonald (Musician / Software Architect)* *Chair - SAE Trust Anchors and Authentication TF* *Co-Chair - TCG Trusted Mobility Solutions WG* *Co-Chair - TCG Metadata Access Protocol SG* On Fri, Feb 23, 2024 at 9:31 AM Denis <denis.ietf@free.fr> wrote: > Hi Ira, > > FYI, the word "Verifier" as used in RFC 9334 does not map to the > "Verifier" role as currently used in the three roles model: > i.e., Holder, Issuer and Verifier, e.g., in VCDM 2.0 from W3C. > > You wrote: > > "A Verifier who never verifies anything is not a useful term". > > A verifier never verifies, nor validates, digital *credentials*, since it > only verifies digital *presentations*. > > Please read again the following sentence: > > A "verifier", an application running in a trusted environment that *verifies > digital presentations* received from a holder. > > This sentence does use the verb "verify". > Denis > > Hi Denis, > > Conflating verification with validation is not helpful. A Verifier who > never verifies anything is not > a useful term. > > It would be appropriate, given the five years of prior work quite close to > the apparent topic of > SPICE, if people read and thought about the terminology already widely > used in IETF working > drafts from RATS Architecture (RFC 9334). > > Cheers, > - Ira > > > On Fri, Feb 23, 2024 at 6:37 AM Denis <denis.ietf@free.fr> wrote: > >> Margaret, >> >> I have the same problem as yourself, .... and many more. See my email >> from yesterday. >> https://mailarchive.ietf.org/arch/msg/spice/eRxcl2xXJEgIYiKWPATZKPuBVcI/ >> >> I wrote: >> >> Furthermore, there is a confusion in the proposed text between "digital >> credentials" and "digital presentations". >> >> Replace by: >> >> An "issuer", an application running in a trusted environment that issues >> digital credentials to its *subscribers **and takes care of their >> validity statu*s. >> >> A "holder", an application running in a trusted environment under the >> control of a user that requests digital credentials to one or more issuers, >> store them and builds from them digital presentations that are then >> communicated to a verifier. >> >> A "verifier", an application running in a trusted environment that >> verifies digital presentations received from a holder. >> >> When the digital credential issuer sends back to the holder a digital >> credential (after a digital credential request), >> the holder needs to verify that the digital credential it receives >> matches with its request. >> >> A verifier never verifies, nor validates, digital credentials. >> >> A verifier receives a digital *presentation* (derived from a digital >> credential) that he needs to validate. >> >> There is no need to introduce a "validator". >> >> >> IMO, in order to be approved, the charter will need to be corrected in >> several places. >> >> >> Denis >> >> I strongly support the creation of this WG, and my answers to the formal >> consensus questions are listed below. >> >> However, I do have one comment on the charter text…. >> >> > A "verifier", an entity (person, device, organization, >> > or software agent) that verifies and validates secured >> > digital credentials. >> >> I question the assumption that the credential will be verified and >> validated by the same entity. I would prefer to see these broken out into >> separate roles. I think that in some cases a credential may be issued and >> verified by the same entity and verified by another entity. Or in some >> cases, all three roles could be separate. >> >> For instance, a student at a university could present a digital >> University ID. The credential could be issued by, and perhaps even >> verified by, the university. However, if the holder needed to validate >> that the issuer was a properly-accredited, US university, a third-party >> validation could be needed to confirm that fact. >> >> So, I would prefer to see the verifier and the validator listed as >> separate roles. >> >> However, this is a comment on the text, not an objection to WG formation. >> >> Margaret >> >> >> (1) Do you support the charter text? Or do you have objections or >> blocking concerns (please describe what they might be and how you would >> propose addressing the concern)? >> >> mrc> Yes, with one comment, above. >> >> If you do support the charter text: >> (2) Are you willing to author or participate in the developed of the WG >> drafts? >> >> mrc> Yes >> >> (3) Are you willing to review the WG drafts? >> >> mrc> Yes >> >> (4) Are you interested in implementing the WG drafts? >> >> mrc> interested? Yes! But as consultants and operators, we’d be more >> likely to deploy and operate an open source implementation of this >> technology for someone else, which we would be eager to do. >> >> _______________________________________________ >> saag mailing listsaag@ietf.orghttps://www.ietf.org/mailman/listinfo/saag >> >> >> _______________________________________________ >> saag mailing list >> saag@ietf.org >> https://www.ietf.org/mailman/listinfo/saag >> > >
- [saag] FW: Call for consensus on SPICE charter Roman Danyliw
- Re: [saag] FW: Call for consensus on SPICE charter Eric Rescorla
- Re: [saag] FW: Call for consensus on SPICE charter Eric Rescorla
- Re: [saag] FW: Call for consensus on SPICE charter Orie Steele
- Re: [saag] FW: Call for consensus on SPICE charter Michael Richardson
- Re: [saag] FW: Call for consensus on SPICE charter Michael Richardson
- Re: [saag] FW: Call for consensus on SPICE charter Orie Steele
- Re: [saag] FW: Call for consensus on SPICE charter Michael Jones
- Re: [saag] Call for consensus on SPICE charter Denis
- Re: [saag] Call for consensus on SPICE charter Margaret Cullen
- Re: [saag] Call for consensus on SPICE charter Ira McDonald
- Re: [saag] Call for consensus on SPICE charter Denis
- Re: [saag] Call for consensus on SPICE charter Ira McDonald
- Re: [saag] Call for consensus on SPICE charter Denis
- Re: [saag] Call for consensus on SPICE charter Ira McDonald
- Re: [saag] Call for consensus on SPICE charter Michael Richardson
- Re: [saag] [SPICE] Call for consensus on SPICE ch… Kaliya Identity Woman
- Re: [saag] FW: Call for consensus on SPICE charter Wang Guilin
- Re: [saag] FW: Call for consensus on SPICE charter Denis