Re: [SPICE] BoF: Problem Statements

Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Wed, 13 September 2023 14:52 UTC

Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: spice@ietfa.amsl.com
Delivered-To: spice@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D6A4C14CE31 for <spice@ietfa.amsl.com>; Wed, 13 Sep 2023 07:52:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.091, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sit.fraunhofer.de header.b="s0rxfbzO"; dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com header.b="dCBwKSji"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Evx7OnEXr1Sw for <spice@ietfa.amsl.com>; Wed, 13 Sep 2023 07:51:54 -0700 (PDT)
Received: from mail-edgeKA24.fraunhofer.de (mail-edgeka24.fraunhofer.de [IPv6:2a03:db80:4420:b000::25:24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77DF8C15153E for <spice@ietf.org>; Wed, 13 Sep 2023 07:51:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=sit.fraunhofer.de; i=@sit.fraunhofer.de; q=dns/txt; s=emailbd1; t=1694616713; x=1726152713; h=message-id:date:subject:to:references:from:in-reply-to: content-transfer-encoding:mime-version; bh=HRtvilpetsZ4zKIJ/oatfHpwrghQmCi0iC3g6Rdb+NU=; b=s0rxfbzOsu2GTwvZ2jFeVFuDmeVioZJvk+n0ih/oufUKxzLVEyHBTrpz Q6pCgaWuKQ2SChAIq9y8IL4UrJT4w0GH+o0cSoPQ39I6fASubkDrGfqIe 8JCPsYCQ6d4ZytwbERGB29GeJ+nYf9WZPV2O3zjafKPjwnZdfq9hzEcuG OuTefe8W40DqbOx5T9jZtPFNM86kU6Jys7pO4BkXFoLPDBConDNFIAO/p Xd7n0y/Uk2Dw7hMKj/w7dUfK6tz8pD//+jM9/sPMAcK4iqaM6Frr9QHpx XnNLT8OWiDqifxjYpH/SQqOoSqlUVZ85N0S6q7N9vpkBLlmbhZsCKrxqx Q==;
Authentication-Results: mail-edgeKA24.fraunhofer.de; dkim=pass (signature verified) header.i=@fraunhofer.onmicrosoft.com
X-IPAS-Result: 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
IronPort-PHdr: A9a23:UnLh2hRJ/W1HWKngnvovkDXIi9psou2eAWYlg6HP9ppQJ/3wt523J lfWoO5thQWUA9aT4Kdehu7fo63sHnYN5Z+RvXxRFf4EW0oLk8wLmQwnDsOfT0r9Kf/hdSshG 8peElRi+iLzKh1OFcLzbEHVuCf34yQbBxP/MgR4PKHyHIvThN6wzOe859jYZAAb4Vj1YeZcN hKz/ynYqsREupZoKKs61knsr2BTcutbgEJEd3mUmQrx4Nv1wI97/nZ1mtcMsvBNS777eKJqf fl9N3ELI2s17cvkuFz4QA2D62E1fk4WnxFLUG2npBv6C5X3rjP+t7pb8Qa3bdX7S+kmXmSSx oVJahzwtjhZGW4H8V3NstB63L5g8Er09Hkdi4SBbKq/K9lFfKLBXepKYVV7dNhrCAtmH6/sT 7QNMuVGP+9ljYrcgmlS7hKTPwyRJunNkRN0j2PT25Mz0MMcIRPKmyIOHPQqgEjbo5LzKboda tzp4I7IwTrbY9xQ3G/i6Y3BWQ4PpPOORqtZVNaPxUozDhGGj1bKp9bPMWrS6+Qqgli6yfdNU PCNiUEVriohjBGJwdU3hZjEqJIp80v72zUjy7oqJNm3QhYqQtD8RcgYp2SbLYxwWsQ4XyRyt T0nzqFToZegZ3tiIPUPwhfeb7mKf4eFwTu5CKCfOz5lgnJidr+lwRq/ogCsyez5A9G9y00C7 jFEnd/Fqm0X2lTN59KGRPpw8gbp2TuG2w3JrOARCU4unLfdK5kvz6R2kZwWsE/ZGTTxllmwh 6iTHng=
X-Talos-CUID: 9a23:mWwT2WE0uJna4tqMqmJk0UgZNZtiNUHa62XgYFW5MldCa/q8HAo=
X-Talos-MUID: 9a23:gsUNFQgsUQFFW8oTLv2VR8MpFvZIpJj/Mmc0sYwN5sK1CSpUfGaak2Hi
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.02,143,1688421600"; d="scan'208";a="58893648"
Received: from mail-mtaka26.fraunhofer.de ([153.96.1.26]) by mail-edgeKA24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Sep 2023 16:51:46 +0200
IronPort-SDR: 6501cc80_qrQXgUS6XDczo1W4o3aFR8Jos1XsKT4NKm9G7Vf+649MiXk hVKInvTFpqDsTL8JnNNz0lURbrV+0xYJGyFHs1w==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:r5aJaBc2Ncq7CfcDuJ22fah/lGM+/N/LVj580XJao6wbK/fr9sH4J 0Wa/vVk1gKXDs3QvuhJj+PGvqynQ2EE6IaMvCNnEtRAAhEfgNgQnwsuDdTDDkv+LfXwaDc9E tgEX1hgrDmgZFNYHMv1e1rI+Di89zcPHBX4OwdvY+PzH4/ZlcOs0O6uvpbUZlYt5nK9NJ1oK xDkgQzNu5stnIFgJ60tmD7EuWBBdOkT5E86DlWVgxv6+oKM7YZuoQFxnt9kycNaSqT9efYIC JljSRk2OGA84sLm8CLOSweC/FIweWUbmRkbZmqN5hGvXJHtqi/75sxU9wTKJcDwFKIzCQSLz YVJSwfWl3kpZwA4zHvvlsYgkJkL+Efywn43ydvYS6uKF8F8f7/9RIM+elBrQPwOcAtcLtOcU IkyAK0DNNt6rKjYlQdNpDaEADSODsG05gNBmlrw46Q59NkRAw2B8iIjOfY+jHvb69PoKagpb byZ66nEwi3PQPVTgSj87YHjbD4ko/OXRJtVbZTdylU2BUDEjQ+e86brZnSo1sM8g0m98sdlR 8CtpFwigFFfix6o1Nwjm4Tnlr4s0W/q5X9y/Jk0IdKyEB9Yb4bxQ9NA8iCAMI1uRdk+Bntlo zs+1ugesIWgL0Diqbwizh/bLvmbequhuEylWvyYPDF4g3xoYvSzikX6/Uuhz7jkX9KvmBZRr yVDm8XRrH1FyRHJ68aGR/c8tkes0DqCzUbSv8lKO0kpk6rcJZM7hLk2k5sYq0PYGSHq3k7xi cer
IronPort-Data: A9a23:JjD6NKNzALHV6CzvrR0lkcFynXyQoLVcMsEvi/4bfWQNrUoi0TAAn GYXDG2Caf+DZjfzfNp1Oo+xo0xTvJTdnYdqQXM5pCpnJ55oRWUpJjg5wmPYZX76whjrFRo/h ykmQoCcappyFBcwnz/1WpD5t35wyKqUcbT1De/AK0hZSBRtIMsboUsLd9UR3Mgw27BVPyvX4 Ymp+5yGYwf/s9JJGjt8B5yr+EsHUMva5WtwUmwWPZhjoFLYnn8JO5MTTYnZw6zQG9Q88kaSH o4v/Znhlo/r105F5uCNzt4XRnY3rov6ZmBivJb2t5+K2XCurgRqukoy2WF1hU1/011llPgpo DlBWADZpQoBZsXxdOohvxZwKAwnM4dHu5r9eEeTitKc/nPDaiHn+qA7ZK02FdVwFudfGmRS7 boVODsNKB6Zjv+wwLW1R/MqislLwMvDZd5E/CA/i2iGXLB/G8+rr6bivbe02B8wi8ZNW/zff ckZbj59RA/Bf1tBIF4KDpI5kuqywHXyG9FdgAzJ/fpuvjGKpOB3+OO1OuPOfuLUf+pux0rbt 0abuFzgJjhPYbRzzhLAqBpAnNTnmjn6VaoODrS+7ft3nFDVx2ofFQYKT1q2upGRkVa/UN93K kEI9Gwpt6dayaCwZoCgBFjp/zvd4U9ZAoAPVfM/rgrLxLDd/gCZAWYJVHhNZbTKqfMLeNDj7 XfQ9/vBCyZmrbuVTnyQ7PGTqzazMjISNmgMeWkPSg5t3jUpiNpbYsvnH449Qp2mxMb4Ay/xy D2spS0zzedbx80S2qnxuRiNjzuwr9KbBkQ49yfGbFKDtwlZXY+CY5D3yF756f0bEp2VYGPct 1c5mu+fzts0M7ezqAK3Tt8wQY6Zv8S+DGWEgHpEPYUQyDC2ynvyIaFS+G5fIWlqAOYleBjoQ l3aiTpM1plxPHeVMKh9ObC1AMV3zprbNM/EU8rMZYFkealBdw6g/QBva3WP3mvrrlMerKEnN bqfcueuFXw/G40+6BaXHsAziaQKwAI6zkPtHaHL9Qyti+eiVSTEWIU7P0urRcFnyqG9+SH+0 ctVbumOwDVhCNzOWDHdq9MvHApbPEoAJM7EruJMfbS+OStgImYqDsHRzZ4He4BIm6d0lP/Cz kqiW313mUbOunnaFTqkMnxTSqvjfZJan0IJOSYBOVWJ2X96b72/s4YZVZ88Joc8+MJZkPVbc vgieue7OMppdAjpwTomQKPGnNRQTyjz3QOqFAi5UQc7ZK9lFlDo+Me7Xw7B9xsuLyuQtOksq o2ZyzHdY5oPeFllBpzkbPmuklCDhlkGuedIR0CTCMJiSEbt14lLKiLKkf48Jf8XGyjD3je30 wW3Aw8SgPvk+qsZ0YDuq/ifjoGLF+BeIBJrL1PD5+zrCRiAr3uR/4BQdc2pIxbfbTrQ04e/b 7x3y/rcDqU2rGxSudAhL4cxnLMM3Pqxlbp01Q8+IW7qaW6sAbZeInWr+8lDm6lO571BszuNR UO91YhGCIqNJf/aPgYdFCg9YsSH8MMkqD3YwPA2AUf9vSFM7OWmV2dWNEKykyBzFuZ+H74k5 uYDg/QozTKDpCAkCfu4qxxF1n+tKyUAWpo3t5tBD47MjBEq+254YpfdK3HX5reTZ/VlL3saI j2dr/fHjLFyn0DHc2QBEEbc+e9ngbUPpxF441sQLHuZmtf+p6EW3T8A1R8VXwhq3hF8/OYrA VdSNmpxPrSowzdkoONhTlKcMVhNKzPB83Og1mZTsnPSSneZc1DkLUo/CL6rx18Y+WcNRQpr1 uiU50i9WAm7Yfyr+DU5XHNkjPnRTdZR0Anms+L/FuSnG6gKWxbUspWMV0Ep9SS+WdgQgXfZr 9ZE5OxzMK33FRABqp0BVrW16+4idwCmFkdjH9dRpa8HJDSJMnX6kz2DMFu4dc5xNuTHux3wQ dBnIsVUEQ+yzmCSpzQcHrQBOKJwgOVv3tcZZ7f3PiQThtNzdNayXE74rUASXFMWfug=
IronPort-HdrOrdr: A9a23:B9OLl6PR30hIqMBcTuGjsMiBIKoaSvp037By7TEWdfRUGvb3qy ncpoVj6faUskdtZJhOo6HjBEDtex/hHNtOkO4s1NSZLXXbUQmTXeRfBOLZqlWKcUDDH6xmpM NdmsNFaeEYeGIK7voSlzPZLz9P+ra6GeuT9J/jJj9WPHpXgo9bnn1ENjo=
X-Talos-CUID: 9a23:6zTTWGzVv0e9nKKrdRYfBgUvN5krWHye6U2JHGODF2lYdriME1SprfY=
X-Talos-MUID: 9a23:guqxzQhALC0ucXlLmJY2jsMpb59i2r+qNh43vq5ft4qVEXE3Ay65pWHi
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.02,143,1688421600"; d="scan'208";a="64081511"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaKA26.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Sep 2023 16:51:44 +0200
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.16; Wed, 13 Sep 2023 16:51:44 +0200
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.175) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.16 via Frontend Transport; Wed, 13 Sep 2023 16:51:44 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=S4aKN2jdIJd6BQ+uDesrc3Wk/4YZh3t47X4yOz6j8Jyott2zexWutjugnqV7BVN3xvsq1ItFHIRXW/gJ9+NGssrY5LJslcZw3rJuv98bwD9S4nWnKQA6nbHgri7pL2FNA/ZN7qh8SEk4X/3lOk2tdpgccUKPgIgNbPPKUpeDZ/PnOeuBFq4qX15z20rXFmjzEQGIbPdAZvrtDRaGgJeX333uXsqM3BG2UgGW5/7WAhMKQ2qd3DDomTDYRnwB3itNnNywLqV9wP9PPbbNPY7TXX4GK5EUbKQQSqp9kkDxSj6QhKucplhPekGKwOIia7gE4YZAbz1or06/JcXHYudeog==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jntpli8NAGE8pen1zo8XAJJJkpVw6F8ViTrPtb8tS80=; b=YD4ZfhM5RmQPmpWzamHZY54ZLQ/GQNY1vBDZ6wEddH0Si+I8wYbqD6Gh4ZFzfWa5N9GvKDqbArBktyu9HMtL03oR3vq4opE15bf/zoW8uWuK1p7NvNIROcJLqoVQFeNYAbO/YherPF2qp7DiCGq4tCQyplQW1iOynnjuLuFISxj7f077aOWgslYRgmp5w0ufjkB2cekq0PAjXNsnZdZVBzB7gsiob5ELdyzre+G/U80nfmgOKFtWDDTe5+Nq3APNl/ZwiiGquqSoHr0WxmR5Zv1EYaQAyWMr8KDUYcGhs7gmc8TBInU+dIhcPfcXTfFNJKBneyFjrHLhwupQaeyfEQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jntpli8NAGE8pen1zo8XAJJJkpVw6F8ViTrPtb8tS80=; b=dCBwKSjitHQ8LWRBvR7OOuD8HWjUg/jaUJkIMZ4+aERmUJbJ3DTatMnVakOUXzd/FFkNLXTgg/nuugST4DOhdgpdGnm0wimaCvFmjjsqAMt6dktqz+ik2f2Bf1/UhOYXINuEmzJjGZmC8FANozsgyeFxTQsWFx2cTwilgb09Kf0=
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8) by BE1P281MB2561.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:6c::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6792.19; Wed, 13 Sep 2023 14:51:43 +0000
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::828d:d79e:7a7d:34c1]) by FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::828d:d79e:7a7d:34c1%5]) with mapi id 15.20.6792.019; Wed, 13 Sep 2023 14:51:43 +0000
Message-ID: <e8d5d62a-ff68-3786-b651-e50e65a064e5@sit.fraunhofer.de>
Date: Wed, 13 Sep 2023 16:51:41 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.0
Content-Language: en-US
To: Orie Steele <orie@transmute.industries>, spice@ietf.org
References: <CAN8C-_+uTsNRFrBZXnPx_6CYk7SOg7cyr5DYBDrK=1A+DRVc9w@mail.gmail.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
In-Reply-To: <CAN8C-_+uTsNRFrBZXnPx_6CYk7SOg7cyr5DYBDrK=1A+DRVc9w@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: FR2P281CA0180.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:9f::9) To FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: FR0P281MB2879:EE_|BE1P281MB2561:EE_
X-MS-Office365-Filtering-Correlation-Id: 7b789cf5-4e1f-4e2d-ad89-08dbb468f1de
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(346002)(366004)(39860400002)(376002)(136003)(396003)(451199024)(1800799009)(186009)(2906002)(83380400001)(6512007)(26005)(2616005)(66574015)(66556008)(316002)(66946007)(44832011)(66476007)(8676002)(8936002)(5660300002)(6486002)(6506007)(41300700001)(53546011)(478600001)(966005)(38100700002)(82960400001)(15974865002)(31696002)(86362001)(31686004)(66899024)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-MS-Exchange-CrossTenant-Network-Message-Id: 7b789cf5-4e1f-4e2d-ad89-08dbb468f1de
X-MS-Exchange-CrossTenant-AuthSource: FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Sep 2023 14:51:43.1965 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: oXZYmj0rQL10QpvXkbJ7uCrVPHZvCrpeLTFBg18X1LkFcPGDlqY4qS5kd1G2B4qZnqeBcwP888FT9CNKiYZIOqWpxr0n2kBU6EdwrD1eY4Q=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BE1P281MB2561
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/spice/xhSwmsZt_CIbwlJ1JY1y0cY2ObU>
Subject: Re: [SPICE] BoF: Problem Statements
X-BeenThere: spice@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Patterns for Internet CrEdentials <spice.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spice>, <mailto:spice-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spice/>
List-Post: <mailto:spice@ietf.org>
List-Help: <mailto:spice-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spice>, <mailto:spice-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Sep 2023 14:52:00 -0000

Hi Orie,
hi list!

I tried to map your problem statements (which I like in a ton, in 
principle! but they could be more problem'esque) to my individual 
understanding of spice.

As a result, I went kinda off-trail and wrote my version of the problem 
statements. Not sure, if that is of help, but what I felt was a bit 
absent were the different dimension of the spice work - of which I think 
the most important ones are probably: credential-type data 
models/encodings, activities performed with respect to credentials, and 
the bigger picture how to re-combine data model specific activities 
across data models.

Here's the result. Please bash. It's a very early pass.


0. Businesses lack a consistent way to create and present credentials. 
For example, there is no coherent interoperability between credential 
solutions based on X.509, CWT, and JWT with respect to the typical 
activities related to them, such as certification, transparency, or 
presentation. Each of these activities deviate slightly from each other 
depending on the credential format/data model used.

1. Other credentials that exist or are emerging today, such as Digital 
Drivers Licenses, Vaxination QR codes, or Verifable Credentials as a 
whole do not come with all the acitvities illustrated in (0.) and also 
lack uniform handling, correspondingly. For example, credential 
formats/data model often don't come with consistent credential delivery 
or presentation protocols.

2. There is no guided procedure enabling the transformation of 
credentials from one format/data model to another. For example, 
presenting a digital drivers license using one format & data model to 
obtain the classes of vehicles that operation of is permitted in another 
format & data model

3. There is no architectural documentation about which types of 
activities apply to all or some of the credential format/data models 
that exist or are emerging. Similarly, there is no rules set defined 
that businesses can use to nest methods related to different credential 
data models, e.g., protecting arbitrary content along with registered 
claim names in CWT or JWT. Or presenting an ISO mDoc with OAuth or via mTLS.

How does this work? It is far from perfect, but does it get the scope 
across? Maybe I went beyond intended scope.


Viele Grüße,

Henk

On 08.09.23 01:04, Orie Steele wrote:
> Hello Fremen (dune reference... sorry).
> 
> As we continue to try to find the relationships between SPICE, OAUTH, 
> COSE, JOSE, WIMSE etc...
> 
> I am sharing some problem statements and solutions to help us refine our 
> BoF request... Please help bash them.
> 
> 0. Businesses need a consistent set of building blocks for securing 
> artifacts and enabling certification, transparency and presentation of 
> credentials to preserve privacy and confidentiality, and reduce friction 
> and improve automation and compliance.
> 
> 1. Digital wallets need a consistent vocabulary and terminology that can 
> be leveraged to build 3 party model protocols, where the trust can 
> travel with the data, instead of just in the channels that move the data.
> 
> 2. Credential exchange protocols need to support high volume business to 
> business communications, in addition to user consent oriented OAuth / 
> OpenID Connect based flows.
> 
> These boil down to fresh looks at some topics that have been previously 
> explored with IETF.
> 
> OAuth helped define how to identify issuers (iss), subjects (sub), and 
> verifiers (aud)... JOSE and JWT have a set of data model building blocks 
> that work well for JSON based information models, and many of the same 
> conventions have been ported to COSE for use with CWT / CBOR.
> 
> OAuth also addressed some details around delivering tokens from 
> "issuers" to "clients".... In the latest OAuth documents, we see 
> "wallets" show up as clients, and the audience binding gives way to the 
> 3 party model, where a credential with key binding can be presented or 
> partially disclosed to verifiers that the original credential issuer may 
> never have imagined.
> 
> There have been various recent IETF drafts that focused on "shapes" of 
> credentials, for example 
> https://datatracker.ietf.org/doc/draft-ietf-rats-eat/ 
> <https://datatracker.ietf.org/doc/draft-ietf-rats-eat/> and 
> https://openid.net/specs/openid-connect-userinfo-vc-1_0-00.html 
> <https://openid.net/specs/openid-connect-userinfo-vc-1_0-00.html> and 
> https://datatracker.ietf.org/doc/draft-looker-oauth-jwt-cwt-status-list/ 
> <https://datatracker.ietf.org/doc/draft-looker-oauth-jwt-cwt-status-list/> and https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/ <https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/>
> 
> The JSON based information models are built on JWT / SD-JWT
> The CBOR based information models are built on CWT. (maybe SD-CWT in the 
> future).
> 
> There are other expressions of digital credentials, particularly ISO 
> mDOC and W3C Verifiable Credentials, but they don't build on IETF standards.
> 
> It was before my time at IETF, but I have heard stories about attribute 
> certificates and urn's that seem to be earlier ancestors of these 
> current technology standards.
> 
> The challenges are not new.
> 
> How to express claims in ways that verifiers can understand?
> 
> How to exchange credentials, how to discover verification or encryption 
> keys, what transports and protocols to use?
> 
> How can we leverage the expertise of IETF to address these challenges, 
> without reinventing wheels unless there is an opportunity to make a 
> worthy improvement?
> 
> Can SPICE be a home to credential data modeling concerns for both the 
> JOSE and COSE communities?
> 
> What parts of OAuth and OIDC are working well for credential exchange, 
> and what is the best way to handle the scenarios that require more 
> automation and higher volume?
> 
> How can we improve our problem statement and solution description and 
> refine what we have in 
> https://datatracker.ietf.org/doc/bofreq-prorock-secure-patterns-for-internet-credentials-spice/ <https://datatracker.ietf.org/doc/bofreq-prorock-secure-patterns-for-internet-credentials-spice/> today?
> 
> Regards,
> 
> OS
> 
> 
> -- 
> 
> 
> ORIE STEELE
> Chief Technology Officer
> www.transmute.industries
> 
> <https://transmute.industries>
> 
>