Re: [SPICE] [OAUTH-WG] Relationship between SPICE and OAuth

Leif Johansson <leifj@sunet.se> Sat, 04 November 2023 08:50 UTC

Return-Path: <leifj@sunet.se>
X-Original-To: spice@ietfa.amsl.com
Delivered-To: spice@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E3B7C2FF2AA for <spice@ietfa.amsl.com>; Sat, 4 Nov 2023 01:50:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.213
X-Spam-Level:
X-Spam-Status: No, score=-6.213 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sunet.se
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n_CvcqcnJ8ad for <spice@ietfa.amsl.com>; Sat, 4 Nov 2023 01:49:59 -0700 (PDT)
Received: from mail-lf1-x12e.google.com (mail-lf1-x12e.google.com [IPv6:2a00:1450:4864:20::12e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28A3CC1705FF for <spice@ietf.org>; Sat, 4 Nov 2023 01:49:58 -0700 (PDT)
Received: by mail-lf1-x12e.google.com with SMTP id 2adb3069b0e04-507be298d2aso3599389e87.1 for <spice@ietf.org>; Sat, 04 Nov 2023 01:49:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sunet.se; s=google; t=1699087797; x=1699692597; darn=ietf.org; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:from:to:cc:subject:date:message-id :reply-to; bh=F91zQp/Z3hzojb94/D6Ec7E4/GQAErVkhtNuAb4VEaU=; b=KjW8LExkCWMRt1Zi8P89Ha0HyO4o76AY2G2CoE53NcVKLMLrTdMnVAOTyf0DSeJYOS ne9ipMRXXTiw47qmQVhJ0gmg/lJ9FUvRqJifLfie4cgI6NGDd749qcM2KqXweH91nZzj hUg+9urVMfWR0WUnwD3Ip6PEqmHymypgZvEXBTP3qhKji68V/B7w55Do7IK6gnnEp0Sv JUChaV5i0fdpMKMdCFx8xWbtV0OYmbpsxnCWZuhUaIR+1MiYHgXMiybOpdNH56WLmZgD QkXYp/KkN9lyJUDUYn8Sr/cONXSypbOdAiuJPklWiHSx/eL8k2saRJELuGHv1wYGSxWl GKeg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1699087797; x=1699692597; h=to:in-reply-to:cc:references:message-id:date:subject:mime-version :from:content-transfer-encoding:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=F91zQp/Z3hzojb94/D6Ec7E4/GQAErVkhtNuAb4VEaU=; b=w4ZwASZADe6ZkHJVbrtZ+/KXIxwm6mbwplAgaqx8PccPG7DCVAZdXxxI7jZGf+97ox pOODC4oBGIfIX8U1E76ckxlI+LpaHwVFz85XLUIcQM16BemWRX1aDW9/YxXKaWL8SlTT 93SeBDbsCURbIPNGUEgsTsrWOxIw7j/bM1kRrDnkjro0I7IytO5WEpGZf2JxrKo0r51Q i3ka/U0QJ28mDvz+5bkUaG8jo73+gscfK0kLuaK8Wyf76NL6FIgKkFTJI+vV6Cp+6jQv B2Drc6lsf3vWice1cLiSm3YZFPhrMGyoSbqGd736nh97ayfnoeTJwWgbp/LE44np47w1 0tmw==
X-Gm-Message-State: AOJu0YwCJEmCgnDZu8vLI0ga5Ni59OTMVGJS2yxDQudOHI96g1IN9lIy sHeDAPTGXw5Qn+p2R53TFvwUE/9n4jrJKBZs2Ss=
X-Google-Smtp-Source: AGHT+IFpZCGJuZ5NpgYm2e5Uuqcc+5bcGLrO8VSkZNqDuzdhyZphqmzlwRH4xP1vDgW+zAJIRdBZ1A==
X-Received: by 2002:a19:4313:0:b0:503:258f:fd1b with SMTP id q19-20020a194313000000b00503258ffd1bmr17661716lfa.18.1699087796456; Sat, 04 Nov 2023 01:49:56 -0700 (PDT)
Received: from smtpclient.apple (h-82-196-111-181.NA.cust.bahnhof.se. [82.196.111.181]) by smtp.gmail.com with ESMTPSA id p13-20020a056512328d00b004fde41a2059sm447756lfe.305.2023.11.04.01.49.55 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 04 Nov 2023 01:49:55 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-BE9FDD28-48A0-42B1-87A5-147A62C7D74D"
Content-Transfer-Encoding: 7bit
From: Leif Johansson <leifj@sunet.se>
Mime-Version: 1.0 (1.0)
Date: Sat, 04 Nov 2023 09:49:44 +0100
Message-Id: <9E6369EF-D6F6-41F8-A5A3-B45BE7320AA3@sunet.se>
References: <CAD9ie-tkbibAwkxN16vhuqaOw6GSnR2ipsid_06v6WJ9h8SLKg@mail.gmail.com>
Cc: Brent Zundel <brent.zundel@gmail.com>, Hannes.Tschofenig@gmx.net, Denis <denis.ietf@free.fr>, spice@ietf.org, oauth <oauth@ietf.org>
In-Reply-To: <CAD9ie-tkbibAwkxN16vhuqaOw6GSnR2ipsid_06v6WJ9h8SLKg@mail.gmail.com>
To: Dick.Hardt@gmail.com
X-Mailer: iPhone Mail (20G75)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spice/f9cOvQgKq5kFXOP5UmRYP5S5SE4>
Subject: Re: [SPICE] [OAUTH-WG] Relationship between SPICE and OAuth
X-BeenThere: spice@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Patterns for Internet CrEdentials <spice.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spice>, <mailto:spice-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spice/>
List-Post: <mailto:spice@ietf.org>
List-Help: <mailto:spice-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spice>, <mailto:spice-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Nov 2023 08:50:03 -0000

I agree with Dick, Watson et al. 

To me moving some work around is a natural consequence of the identity area and the 3 party model growing in importance in the IETF and elsewhere. 

Given what’s happening in the EU and elsewhere this should not cone as a surprise to anyone.

Cheers Leif


3 nov. 2023 kl. 16:58 skrev Dick Hardt <dick.hardt@gmail.com>:


One source of delays could be different chairs that don't have the same context.

Hard to imagine why the people participating in the oauth group would not keep participating in a spice group.

I don't have a strong opinion -- but I am surprised by the angst expressed about having a discussion about moving the work. It would be surprising to NOT have a discussion about moving work in the BoF. 

Hannes, Rifaat, Pam et al have been doing a stellar job herding the cats and they have always been striving to do what is right for the community. Let's cut them some slack.




On Fri, Nov 3, 2023 at 4:01 AM Brent Zundel <brent.zundel@gmail.com> wrote:
I agree with Watson.
I also don't understand what delays in the work would occur as a consequence of managing it in a different group. 

On Fri, Nov 3, 2023, 9:49 AM <hannes.tschofenig@gmx.net> wrote:

Hi Denis,

 

It is true that the current OAuth charter does not address the three party model.

 

This is why Rifaat and I have put an agenda item to the OAuth meeting to discuss a charter update. We will talk about this new charter on Tuesday after the WIMSE and the SPICE BOFs took place.

 

Ciao

Hannes

 

From: Denis <denis.ietf@free.fr>
Sent: Mittwoch, 1. November 2023 19:18
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Cc: spice@ietf.org; oauth <oauth@ietf.org>
Subject: Re: [SPICE] [OAUTH-WG] Relationship between SPICE and OAuth

 

Hi Hannes,

 

The current charter of the OAuth WG is available at: https://datatracker.ietf.org/wg/oauth/about/" rel="noreferrer nofollow" target="_blank">https://datatracker.ietf.org/wg/oauth/about/

The major problem is that both this charter and the OAuth 2.1 (or OAuth 2.0) authorization framework
cannot currently address the three roles model with an Holder, an Issuer and Verifier. In the three roles model,
there is no concept of a "resource owner ", nor of a "resource owner's consent".

Bridging the architectural narrative used in the core OAuth framework (AS, RS, RO) and in the three roles model
(Holder, Issuer, Verifier) would not be appropriate.

As Justin mentioned in https://oauth.net/articles/authentication/" rel="noreferrer nofollow" target="_blank">https://oauth.net/articles/authentication/:

      "Remember, since OAuth is a delegation protocol, this is fundamental to its design".
      "In OAuth, the token is designed to be opaque to the client, but in the context of a user authentication,
       the client needs to be able to derive some information from the token".

The current draft from "The OAuth 2.1 Authorization Framework" states in section 1.4
(https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-09.html#name-access-token" rel="noreferrer nofollow" target="_blank">https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-09.html#name-access-token):

       "An access token is a string representing an authorization issued to the client.
        The string is considered opaque to the client, even if it has a structure".

When using selective disclosure, the access token cannot remain opaque to the client since it needs to be opened and modified by the client.
"Selective disclosure" is not a requirement: it is one mechanism that allows to support the privacy principle of "collection limitation",
i.e., limiting the collection of end-users attributes to that which is strictly necessary for the specified purpose(s).

However, "selectively disclosable claims" is only the tip of the "three roles model" iceberg, since other disclosure mechanisms, e.g., based on zero knowledge techniques
can be used and several privacy and security properties need to be considered. With some models, some properties can be supported, while with other models they can't.

The OAuth 2.0/2.1 framework cannot apply to a three roles model with an Holder, an Issuer and Verifier. Rather than working with document increments
based on the OAuth 2.0/2.1 framework, a re-chartering the OAuth working group would be necessary so that a framework tailored to the vocabulary
of three roles model could then be developed.

It should finally be noticed that the acronym of this WG, "OAuth", is a short for "Open Authorization". It is questionable whether that acronym or its meaning
would still be appropriate to address the three roles model which does not fit into the OAuth 2.0/2.1 framework.

Note: On the SPICE BoF mailing list, I raised an issue and proposed an alternative strawman proposal for the spice-charter
(https://github.com/transmute-industries/ietf-spice-charter/issues/3" rel="noreferrer nofollow" target="_blank">https://github.com/transmute-industries/ietf-spice-charter/issues/3). I also sent several emails requesting changes to the wording of the proposed charter.
Please note that at this time, I don't agree with the current wording of the SPICE BoF charter.


Denis

 

Hi Hannes, 

Am 1. Nov. 2023, 12:21 +0100 schrieb Hannes Tschofenig <hannes.tschofenig@gmx.net>:

Hi all,

I am a bit puzzled by the response Pam and I received when putting the agenda for the SPICE BOF together. It appears that most people have not paid attention to the discussions during the last few months.

Let me try to get you up to speed. So, here is my summary.

The OAuth working group has seen a lot of interest in the context of the SD-JWT/VC work and there have been complaints about the three WG sessions we scheduled at the last IETF meeting. (FWIW neither Rifaat nor I understood why we received these complaints given that people asked us for more slots. But that's another story...)

The SD-JWT/VC work is architecturally different to the classical OAuth (which is not a problem) but raises questions about the scope of the work done in the OAuth working group, as defined by the charter. The charter of a group is a "contract" with the steering committee (IESG) about the work we are supposed to be doing. There is the expectation that the work described in the charter and in the milestones somehow matches the work the group is doing (at least to some approximation). See also the mail from Roman to the OAuth list for the type of questions that surfaced: https://mailarchive.ietf.org/arch/msg/oauth/a_MEz2SqU7JYEw3gKxKzSrRlQFA/" rel="noreferrer nofollow" target="_blank">https://mailarchive.ietf.org/arch/msg/oauth/a_MEz2SqU7JYEw3gKxKzSrRlQFA/
In time for the Prague IETF meeting a BOF request (with the shiny name SPICE, see https://datatracker.ietf.org/doc/bofreq-prorock-secure-patterns-for-internet-credentials-spice/" rel="noreferrer nofollow" target="_blank">https://datatracker.ietf.org/doc/bofreq-prorock-secure-patterns-for-internet-credentials-spice/) was submitted. It was subsequently approved by the IESG. SPICE aims to cover the scope of the SD-JWT/VC work (plus work on defining the CWT-based counterparts) -- my rough summary; details are here: https://github.com/transmute-industries/ietf-spice-charter/blob/main/charter.md" rel="noreferrer nofollow" target="_blank">https://github.com/transmute-industries/ietf-spice-charter/blob/main/charter.md

This BOF request again raised questions about the scope and the relationship with OAuth, see Roman's note here: https://mailarchive.ietf.org/arch/msg/spice/Aoe86A0x6bezllwx17Xd5TOQ3Pc/" rel="noreferrer nofollow" target="_blank">https://mailarchive.ietf.org/arch/msg/spice/Aoe86A0x6bezllwx17Xd5TOQ3Pc/
Now, we are in the final stages of preparing the BOF for the Prague IETF and in the agenda preparation we repeately get asked the same question:

"Has the transfer of some of the OAuth documents already been agreed?"

The answer is "no". Nothing has been agreed. The purpose of the BOF is to find this agreement.

So, if you have an opinion whether some of the OAuth documents (in particular draft-ietf-oauth-sd-jwt-vc, draft-ietf-oauth-selective-disclosure-jwt, draft-ietf-oauth-status-list) should move to a new working group then you should speak up **now**.

Have a missed a posting on this list where you have started a discussion with the WG of whether the drafts shall be moved into SPICE now? Otherwise I’m wondering about the tone of your post. It’s the WG that needs to decide on this topic, right? It’s not up to the WG chairs to do so. 


The SPICE BOF (and the WIMSE BOF) will happen on Tuesday next week. The first OAuth WG session happens shortly afterwards (also on Tuesday). The outcome of the BOF(s) will guide us in our discussion about re-chartering the OAuth working group (which is an item on the OAuth agenda, see https://datatracker.ietf.org/meeting/118/materials/agenda-118-oauth-03" rel="noreferrer nofollow" target="_blank">https://datatracker.ietf.org/meeting/118/materials/agenda-118-oauth-03).

Rifaat, Pam and I are mediators in this process and therefore we rely on your input. Since you have to do the work, you should think about where you want to do it.

Ciao
Hannes

PS: A process-related note. If you are author of a working group document you are working for the group. With the transition from an individual document to a working group document you have relinquished control to the group. While your opinion is important, it has the same weight as the opinion of any other working group participant. The theme is "We reject: kings, presidents, and voting. We believe in: rough consensus and running code".

Absolutely. So let’s have a discussion in the WG. 

best regards,
Torsten. 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth" rel="noreferrer nofollow" target="_blank">https://www.ietf.org/mailman/listinfo/oauth



 

--
SPICE mailing list
SPICE@ietf.org
https://www.ietf.org/mailman/listinfo/spice" rel="noreferrer noreferrer nofollow" target="_blank">https://www.ietf.org/mailman/listinfo/spice
--
SPICE mailing list
SPICE@ietf.org
https://www.ietf.org/mailman/listinfo/spice" rel="noreferrer nofollow" target="_blank">https://www.ietf.org/mailman/listinfo/spice
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth