[Secret] AD Review of the proposed charter

Roman Danyliw <rdd@cert.org> Fri, 29 April 2022 22:10 UTC

Return-Path: <rdd@cert.org>
X-Original-To: secret@ietfa.amsl.com
Delivered-To: secret@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D0F5C159525 for <secret@ietfa.amsl.com>; Fri, 29 Apr 2022 15:10:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=seicmu.onmicrosoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id owITgryjMLNn for <secret@ietfa.amsl.com>; Fri, 29 Apr 2022 15:10:47 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0731.outbound.protection.office365.us [IPv6:2001:489a:2202:c::731]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A0FD5C159521 for <secret@ietf.org>; Fri, 29 Apr 2022 15:10:46 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=BBK+ruIJ7LggXpSOzbCsCOHNWgO+UzHhFYg2D0/g+PoBT9fGJESUSjTszemLtqg4bL9MB0E+RUfCNZtmNw84xk8a+z14q7Re+HLxrMSr4R6h8s8EP4QQ29wLHG51rWx/6HCd662kzcqy0InPtr4TvfwQO1B3HZ9usQSpo5PZntp+GU/acy1i47yRktr4ZlQTau27aqWnx/PtWkuJmXDV7Ri5bGite3oJCOgBSUJ3iX3mJfQXzqZZi2mexDD4WVzOkRFBAjXW0tUUuypbZto+A/yVl/sbSUYsYA1yqEKMDbpRI35VWqlMtOqTt/1rlWaVorjNbHFmjLIj4fNYQNu/Qw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g82/rfLYzfCAHYxAecFJtzZvjNKCMXYFApj60D5dNw0=; b=SwXIkPK289HT0z6A7uczS9VBR1xl4x3AUILacUxQQqX3dcLu9QwCoBry3qj4m8OAZOinVU6h8CG4emWJS0JD3p9KIIz7+H/w95uQbyRC4Olo1lJU4y3u46motXp6/XjEikhq9GUJ0L/lQ9G7kwGOuvy1h7dfakBTHIeIjrfoOAEDrGg59WrFxMzuw8TLDXIlQ3qatpXPH0/5fFiURPkOmRfNB54Yd5CKNkycoaG+iyZreyMn0u5U87gVvkSSvzdsrQsnYOL6/IW2MB0Qt9/Qcbwa4v0fWxUWLto66js7YUzWVAmdFv9sTUMRrw0TxRUvwXVwo8lCiiw93UrN58oxMg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seicmu.onmicrosoft.com; s=selector1-seicmu-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g82/rfLYzfCAHYxAecFJtzZvjNKCMXYFApj60D5dNw0=; b=VJRAow2syZB72Lf0AJRTRIe1ai12YhT5Y11kwSStOQFh1+vXwDqXdWayxE9298wI2T7uS8qeuGJg5ko2hknddwX9Ho2q/NfL56e8NmqjV1AbtonVOKNO1eTTZQyMgbyeIfJIN52TfGjZUpYlJA5dQv73KjFSu5Or+mW+vmtfqmw=
Received: from PH1P110MB1116.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:174::12) by PH1P110MB1378.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:18d::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5186.14; Fri, 29 Apr 2022 22:10:40 +0000
Received: from PH1P110MB1116.NAMP110.PROD.OUTLOOK.COM ([fe80::b5e4:ae9e:26f6:5662]) by PH1P110MB1116.NAMP110.PROD.OUTLOOK.COM ([fe80::b5e4:ae9e:26f6:5662%5]) with mapi id 15.20.5186.021; Fri, 29 Apr 2022 22:10:40 +0000
From: Roman Danyliw <rdd@cert.org>
To: "secret@ietf.org" <secret@ietf.org>
Thread-Topic: AD Review of the proposed charter
Thread-Index: AdhcE8MG4VmH+3IOTBi3z1Fo9FWo2Q==
Date: Fri, 29 Apr 2022 22:10:40 +0000
Message-ID: <PH1P110MB1116CF8D2A885C4E90705ECCDCFC9@PH1P110MB1116.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5878f714-42dc-4c7c-36eb-08da2a2d18c3
x-ms-traffictypediagnostic: PH1P110MB1378:EE_
x-microsoft-antispam-prvs: <PH1P110MB137814CAD832ADC28983C7FEDCFC9@PH1P110MB1378.NAMP110.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH1P110MB1116.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(366004)(82960400001)(2906002)(6506007)(9686003)(508600001)(7696005)(86362001)(186003)(966005)(6916009)(71200400001)(316002)(33656002)(122000001)(38100700002)(26005)(83380400001)(5660300002)(38070700005)(66446008)(66556008)(66476007)(8676002)(52536014)(76116006)(8936002)(64756008)(66946007)(55016003); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 4POwFnLlzkJBvHQpMyS7T68FA3MfaNUpDRiuTuqxTP14fQP9o6XJb0NHBCM1lHtUapyJDsX+I/+ucRtFDW05zDscsqVelrSahUyOgD9DAONEmWLop0DKukSanM+YbZFA/dGBOrWd4nwPGedJO7BTxSgd2111x4nqaadz8bnAJ2ikFCLGOAglI59WcDND0hbXbPW0OxWCiaQ5I81j/jr/5t2hbz8n/8H8RTgaAfhqtxljvNA03ZZ8VdEHrUWl9Gj0I+4+k3ZmkVRLj5baU75089bHtcNjrmkauj4T3sPF3qtWuPNJDRWlWyXBRj9HG/QoxGkk/HRBM72ZrBTzYe3c3XCpd+A8I0zqHrYqldakqzhu9UkMfrdLFgLPU0PRDvQqkguko/Pw9JLGrzhhdrg64FBBOThIkFH3axkA9P2NnMY=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH1P110MB1116.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 5878f714-42dc-4c7c-36eb-08da2a2d18c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Apr 2022 22:10:40.3531 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH1P110MB1378
Archived-At: <https://mailarchive.ietf.org/arch/msg/secret/CLwluplaKSd7Tacd0e2WMpcysok>
Subject: [Secret] AD Review of the proposed charter
X-BeenThere: secret@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Secure Credential Transfer <secret.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secret>, <mailto:secret-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secret/>
List-Post: <mailto:secret@ietf.org>
List-Help: <mailto:secret-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secret>, <mailto:secret-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Apr 2022 22:10:49 -0000

Hi!

Congrats on a successful BoF thanks to the preparation of the proponents and the chairs. The importance of getting both ART and SEC input on this work was voiced on list and during the BOF.  After discussion among the ART-SEC ADs, the resolution was for this work to be administratively housed in the ART area with a SEC AD.  Hence, I'll be picking up this work as the responsible AD.

The next step to get a working group started is to have charter that captures all of the feedback to date.  I heard some charter discussion during the BoF and read more on list.  I reviewed the Feb-22 version I found at https://github.com/dimmyvi/secure-credential-transfer/blob/main/charter.md as the basis for the following comments.  It interleaves my own new feedback and that of the BoF/ML that doesn't appear to be addressed.  

Specific comments on the charter text:

** Paragraph 1. "There are many situations in which it is desirable to share a digital credential with another person. For example, you may want to provide access to your vehicle to a friend or a family member. You may also want to provide access to your home to your cat sitter. Or, you may want to share a hotel key with your spouse. Today, no such standardized method exists in a cross-platform, multidisciplinary capacity."

-- (from BoF) Per "There are many situations in which it is desirable to share a digital credential with another person", there was feedback (Michael Richardson) that this text creates confusion because the WG is in fact focused on delegating, not sharing the credential.

-- (from BoF) The proponents (Matt Byington) in response community feedback (Stephen Farrell) noted that "multidisciplinary" could be clarified

** Paragraph 2.  "The WG charter includes the definition and standardization of a protocol that will facilitate such credential transfers from individual to individual. The protocol will leverage a "relay server" to transfer data from sender to recipient. The scope of the transfer is limited to a single origin device and a single destination device. Note that neither private keys nor secret symmetric keys present on the sender's device are exchanged during the transfer operation. In the transfer protocol, the "credential" being sent from sender to recipient comprises data both necessary and sufficient for the recipient to exchange with the credential authority for new digital key material granting the recipient a subset of the sender's capabilities or entitlements."

-- (from BoF) Ben Kaduk noted that it should be clarified if this is "individual to individual" or "individual+device" to "individual+device" (or user agent) 

** Paragraph 3. "Privacy goals include:
o    The relay server should not see sensitive details of the share
o The relay server should not be able to provision the credential itself, acting as an intermediary for the recipient (MiTM)
o Aside from potentially the IP address, the relay server should not learn the identity of the sender or receiver"

-- In the spirit of inclusive language, please use a different expression than "MiTM"

** Paragraph 4. "Sufficient security measures should be embedded in the protocol in an effort to:
o Ensure only the intended recipient is able to provision the credential
o Ensure the credential can only be provisioned once (Anti-replay)
o Ensure the sender has intent to share (secure user intent)"

-- s/Anti-replay/anti-replay/

** Paragraph 5. "The solution the WG comes up with must: ..."

-- Per "Allow a sender to initiate a share", given that this came up in the BOF discussion, perhaps append "and define the relay server".

-- Per "Ensure the sender has intent to share (secure user intent)", it isn't clear to me what the parenthetical "(secure user intent)" clarifies.

-- Per "Allow dynamic message formats based on the credential type", it was clear to me what "dynamic" means here.  Are the protocol message formats are changing based on the credential type?  Or is it that the protocol will be capable of carrying many different types of credentials (they are opaque blobs, the protocol is agnostic)?

-- Per "Allow sender device and receiver device to quickly perform multiple round trip communications", this came up in the BoF too, is there a way to provide a performance envelope around "quickly".  Is the basis for this CCC and the referenced ISO protocol?

** Paragraph 6. "Out of scope topics for the proposed WG are: ..."

-- s/the proposed WG/the WG/

-- Per "Defining the mechanism the receiver will use in order to provision the credential", I recommend appending "with the credential authority" to reference the notional architecture defined in paragraph 2

-- Per "The WG will define the full set of different credential types that could be shared. A subset of these credential types adhere to a public standard. For these credential types, the format of the Provisioning Information shall be defined by the appropriate standard. Other credential types may be proprietary. For these credential types, the protocol the WG aims to establish shall not define the actual format nor content of each field within the Provisioning Information."

I stumbled on this paragraph because it's listing assumptions, what the WG will do and what is out of scope, all in a bulleted list of what the WG will not do.  I recommend unpacking this.

(a) What does it mean for the WG to "define a full set of different credentials"?  Do you mean that the protocol will have code points?

(b) There is a significance being attached to the credential types being public vs. proprietary which I don't follow.  This is text is also introducing an undefined construct of "Provisioning Information" as a discriminator.  Aren't the credential opaque blobs as far as the protocol is concerned?  Can this please be clarified.

(c) As a proposal for streamlining this text, make this bullet read only about what's out of scope: "Defining the format and setting the values (? contents?) of the credential carried by the protocol"

(d) Perhaps put what the protocol expects in the "The solution of the WG must" paragraph.  I'd like to help wordsmith this but all I can follow is that the protocol has to support credential standards not defined by this WG.  Per (b), the nuance around "provisioning information" should help with the rest.

Other more generic charter comments:

** (from BoF) There were a few comments about bounding the communication channel and distinguishing it from a generic tunnel protocol.  It was explained that this protocol will need to work around the constraints of CCC and a particular ISO spec (I missed which one).  I believe there was a commitment to reference these explicitly.

** What are the milestones that this WG plans to make (as a first pass)?  These need to be explicitly listed - date + milestone.  I would imagine there is the protocol itself (the text says that).  Is there a informational architecture or use case document?  Any profile for a given vertical?  It is fine if the answer is no, but now would be the time to describe it (otherwise it will be out of scope without a recharter).   

Other administrative matters:

** There is a strong signal, which I agree with, that "SECRET" should not be the WG name.  My working understanding from past BOF chair/proponent discussion is that TIGRESS ("Transfer dIGital cREdentialS Securely") is the new proposed WG name.  I'm dropping it here on the list to hear if there are strong objections.  I'd beg the group not to bike-shedding here unless this name is major problem.

** There was a question about why different OAuth approaches couldn't be used.  See https://mailarchive.ietf.org/arch/msg/secret/0VUSVrIRHbRSfEk3uo0BnXJvPpM/.  It would be good to document that on the list.

Regards,
Roman