[Secdispatch] Requesting agenda time for draft-private-access-tokens

Tommy Pauly <tpauly@apple.com> Mon, 25 October 2021 20:01 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 069F33A084B for <secdispatch@ietfa.amsl.com>; Mon, 25 Oct 2021 13:01:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A7G7514Oxgqs for <secdispatch@ietfa.amsl.com>; Mon, 25 Oct 2021 13:01:27 -0700 (PDT)
Received: from rn-mailsvcp-ppex-lapp14.apple.com (rn-mailsvcp-ppex-lapp14.rno.apple.com [17.179.253.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D82D73A0AA8 for <Secdispatch@ietf.org>; Mon, 25 Oct 2021 13:00:38 -0700 (PDT)
Received: from pps.filterd (rn-mailsvcp-ppex-lapp14.rno.apple.com [127.0.0.1]) by rn-mailsvcp-ppex-lapp14.rno.apple.com (8.16.1.2/8.16.1.2) with SMTP id 19PJtLww029882; Mon, 25 Oct 2021 13:00:31 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : content-type : mime-version : subject : date : references : cc : to : message-id; s=20180706; bh=qOr1XLbF1lXeSxc9YdBgHcAlybV66HZoiM6wgvff5dY=; b=MS7T6nUl8egnunVTQqSyyfcmraznpvd96Od4P1yS6vxb5lLv2ypzqAakaLq1VNcTTzc7 D68mSvxVCXLNPp6j1LQerhEwsmjNUSofWD+Klu5Fvw2IYLT+q/Ruv5BZmZM2QkAL+pQl wngYULF6P4hdF4PyXubSvC/ZFzE80hVDf9Y1xQR43QnafCkezOyHHBjZJwn6FPXMk2mB 7vZzZGSRFj5jtkWdIh0eYUMe4BvK3Og03FqZ5fddFBBsfTF/Mhndf7YmBZzwI4uja38X PBDU8mjWYqXFUSMmiZquYHbUiYXvdROSDwZAfAZGHcjoFzbhuiVKEGYqmyneuG0GKeKZ pA==
Received: from rn-mailsvcp-mta-lapp03.rno.apple.com (rn-mailsvcp-mta-lapp03.rno.apple.com [10.225.203.151]) by rn-mailsvcp-ppex-lapp14.rno.apple.com with ESMTP id 3bvf9cn97n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 25 Oct 2021 13:00:31 -0700
Received: from rn-mailsvcp-mmp-lapp04.rno.apple.com (rn-mailsvcp-mmp-lapp04.rno.apple.com [17.179.253.17]) by rn-mailsvcp-mta-lapp03.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) with ESMTPS id <0R1J00N6KU8VVE50@rn-mailsvcp-mta-lapp03.rno.apple.com>; Mon, 25 Oct 2021 13:00:31 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp04.rno.apple.com by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) id <0R1J00G00TY60X00@rn-mailsvcp-mmp-lapp04.rno.apple.com>; Mon, 25 Oct 2021 13:00:31 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 1780dac9747bf9c074f60db715b1dfd5
X-Va-E-CD: 4bc6be1c35d4be9a4bba8cba9b3dd459
X-Va-R-CD: 6dfd681be5934ef149a0f40ca129b643
X-Va-CD: 0
X-Va-ID: 991d75c5-5d93-42a9-a26e-c8feeed3d71c
X-V-A:
X-V-T-CD: 1780dac9747bf9c074f60db715b1dfd5
X-V-E-CD: 4bc6be1c35d4be9a4bba8cba9b3dd459
X-V-R-CD: 6dfd681be5934ef149a0f40ca129b643
X-V-CD: 0
X-V-ID: 1dbde46c-dab0-4989-b840-752c948336eb
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.790 definitions=2021-10-25_07:2021-10-25, 2021-10-25 signatures=0
Received: from smtpclient.apple (unknown [17.234.59.124]) by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) with ESMTPSA id <0R1J008GYU8UYO00@rn-mailsvcp-mmp-lapp04.rno.apple.com>; Mon, 25 Oct 2021 13:00:30 -0700 (PDT)
From: Tommy Pauly <tpauly@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_CD68181E-84C0-49C8-B47D-0D889025378C"
MIME-version: 1.0 (Mac OS X Mail 15.0 \(3691.0.3\))
Date: Mon, 25 Oct 2021 13:00:29 -0700
References: <163519158647.7470.5967840992186527470@ietfa.amsl.com>
Cc: Jana Iyengar <jri@fastly.com>, Christopher Wood <caw@heapingbits.net>, Steven Valdez <svaldez@google.com>, Scott Hendrickson <shendrick@google.com>
To: Secdispatch@ietf.org
Message-id: <A204B94F-77CC-4D3C-8FA6-F6F68ED3D32F@apple.com>
X-Mailer: Apple Mail (2.3691.0.3)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.790 definitions=2021-10-25_07:2021-10-25, 2021-10-25 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/ABhJrIZcXtFw2TL_kjm9jFoibck>
Subject: [Secdispatch] Requesting agenda time for draft-private-access-tokens
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Oct 2021 20:01:32 -0000

Hi SECDISPATCH,

Several of us have been developing a new protocol spec called Private Access Tokens. This is a publicly verifiable anonymous token (based on RSA blind signatures) that can be presented to origins as HTTP authentication, based on a system of token issuance that allows anonymous per-origin rate limiting. The goal here is to make it possible to work with metered paywalls and fraud prevention systems even when clients are using anonymous IP addresses to access origins.

We’d like to discuss this at IETF 112, and we’d love to hear thoughts on comments on this list before then as well.

https://www.ietf.org/archive/id/draft-private-access-tokens-00.html <https://www.ietf.org/archive/id/draft-private-access-tokens-00.html>

Best,
Tommy, Chris, Jana, Steven, & Scott

> Begin forwarded message:
> 
> From: internet-drafts@ietf.org
> Subject: New Version Notification for draft-private-access-tokens-00.txt
> Date: October 25, 2021 at 12:53:06 PM PDT
> To: "Christopher A. Wood" <caw@heapingbits.net>, Christopher Wood <caw@heapingbits.net>, Jana Iyengar <jri@fastly.com>, Scott Hendrickson <scott@shendrickson.com>, Steven Valdez <svaldez@chromium.org>, Tommy Pauly <tpauly@apple.com>
> 
> 
> A new version of I-D, draft-private-access-tokens-00.txt
> has been successfully submitted by Tommy Pauly and posted to the
> IETF repository.
> 
> Name:		draft-private-access-tokens
> Revision:	00
> Title:		Private Access Tokens
> Document date:	2021-10-25
> Group:		Individual Submission
> Pages:		37
> URL:            https://www.ietf.org/archive/id/draft-private-access-tokens-00.txt
> Status:         https://datatracker.ietf.org/doc/draft-private-access-tokens/
> Html:           https://www.ietf.org/archive/id/draft-private-access-tokens-00.html
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-private-access-tokens
> 
> 
> Abstract:
>   This document defines a protocol for issuing and redeeming privacy-
>   preserving access tokens.  These tokens can adhere to an issuance
>   policy, allowing a service to limit access according to the policy
>   without tracking client identity.
> 
> Discussion Venues
> 
>   This note is to be removed before publishing as an RFC.
> 
>   Source for this draft and an issue tracker can be found at
>   https://github.com/tfpauly/privacy-proxy.
> 
> 
> 
> 
> The IETF Secretariat
> 
>