Re: [Txauth] Additional implementation
Fabien Imbault <fabien.imbault@gmail.com> Mon, 06 July 2020 16:30 UTC
Return-Path: <fabien.imbault@gmail.com>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF7CA3A16E7 for <txauth@ietfa.amsl.com>; Mon, 6 Jul 2020 09:30:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SPjbk19ld_22 for <txauth@ietfa.amsl.com>; Mon, 6 Jul 2020 09:30:13 -0700 (PDT)
Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5C1A3A16E0 for <txauth@ietf.org>; Mon, 6 Jul 2020 09:30:13 -0700 (PDT)
Received: by mail-io1-xd2d.google.com with SMTP id o5so39904356iow.8 for <txauth@ietf.org>; Mon, 06 Jul 2020 09:30:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9Fi2zqffl7aiBrCMkNAWKFNJ87K93W8VVbeyyfJthM8=; b=CKj8Ad7aJC/EjZ3x5jJbE3+BMcEfiG1pHuDuStYom1M6SCXsCxTkW7JVVpoOHvDjdR 1dybZNKQh/jdEDxCYhZqogx9IjuAokeik+0mRfCeTN/WFbiFmRp7y2WyP+eUV6qyMF2y DPsKjnBlcvlZw26qYIIf5vPKKyvg3qDuSQ6lNu0B3mRUwNu8PEYynQvMs8wTM566zSft EXwHiPIRFLvbw0XbR04ixImc+Gi6qeJCU37OWs9yhjzyukb8Da361hu3e7AK73wrfHNe tvam+ZentZjl16e5sqcnL+Ftgn3/0qsAlnjVBg00lkmT6V5B66LdxM7mEnPK5v7tE4eb AuKg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9Fi2zqffl7aiBrCMkNAWKFNJ87K93W8VVbeyyfJthM8=; b=Pmi1Km9I4PV8OVrRQrzmK590kLVTBi1oDngNty/G2w7SZuqfzF527YojZKdBhDIFpD sRanqtEyK0EAy3shBGQp5I4zT972PjBAgGbolkN98fF7IMVr6xRUEj4kykoxklW/qCBr a1yvKNn1yTzSLrpMHFFPUXnbSKZm5yAAViG7R4bapjc1DqgDd/Ne+D9OK0tG7GtB2hgG XaZ0ZS0dYqJN4diyNNsGdLHnLTiGT5RYyZfqxChhXfZrXZ1O/jOKpgYHUM6If/TJAWaN elTzabXdDQaaaJqTp/NwPS7XMPx3MOkQjdpwupUdVfT3IaNeEkPEmgo2PxuHp8dIjeij yZcA==
X-Gm-Message-State: AOAM533C6yL5MoLT78u3kz6a4C9t1RLG1Vfl5ysCEuB1HQ3CLhsBXuWX VLJT2fR4xiSniF8ytj2eJqFI0PjrM7xOQfbsjlY=
X-Google-Smtp-Source: ABdhPJwu76YWkfTdX+/fUO9MZUClxxiEHLR2NtbIYcnFoWqX/dLbbvvE/tizt5wrHN+SqtUfmwstUHiQz0vYCXffLDc=
X-Received: by 2002:a5d:8f98:: with SMTP id l24mr25927383iol.141.1594053012927; Mon, 06 Jul 2020 09:30:12 -0700 (PDT)
MIME-Version: 1.0
References: <CAM8feuRA1VfPs6bdrGgssBeBNe4wPySHjKcjiP6HexKMUff4DQ@mail.gmail.com> <CAD9ie-t7Lzt8S09YKPqwhc__7fKU6XpsyL1m8CGYUqfQwj8+ww@mail.gmail.com> <CAM8feuQK7HnKWd4TuusKy6z5q0K8V1+fO7xdqnLwOckThgtfNw@mail.gmail.com> <CAM8feuT5VO3w-PJWX-SWL0tdoCH4TfzfTnabD5kNLfZ=T8nAZw@mail.gmail.com> <CAD9ie-vUGGRcsv2mC6OD=p2P-jRLbpWo1dOfq3AVYc9gU1S8hA@mail.gmail.com> <CAM8feuRc_arjH-mKyXo+4k_PzRZ0Pq83fkNsN3_YM0mZ8VmmMg@mail.gmail.com> <CAD9ie-un7KEtreop+CYgkds5R89Xc26qCxt5Zd9zHRzY9UEH5Q@mail.gmail.com> <20200705225343.GQ16335@kduck.mit.edu> <CAM8feuTBw+ZqMpEpsYMkEKbytWA227NcMNHp00R7s0jFhcEXjw@mail.gmail.com> <CAD9ie-vmrb+Qa2VEAL9BbSTh8f8oqSBRrXZgzQ2aSSsQZLmu8w@mail.gmail.com> <e864b497-be5a-4feb-982f-4acfbff96725@www.fastmail.com> <CAD9ie-s-QKx_j3-AkLmRfo7e47M_HPodYB8_Q3ni4wkEkAjAEQ@mail.gmail.com>
In-Reply-To: <CAD9ie-s-QKx_j3-AkLmRfo7e47M_HPodYB8_Q3ni4wkEkAjAEQ@mail.gmail.com>
From: Fabien Imbault <fabien.imbault@gmail.com>
Date: Mon, 06 Jul 2020 18:30:00 +0200
Message-ID: <CAM8feuRhOtAX+g0AkgbNuTNEEh5YxY_9tBG+=JhkUvJ5NueqSA@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Cc: Wayne Chang <wyc@fastmail.fm>, Benjamin Kaduk <kaduk@mit.edu>, txauth@ietf.org
Content-Type: multipart/alternative; boundary="00000000000096bb0005a9c86312"
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/Mf0zgC-65FFK1CKKOhrgl6bLII0>
Subject: Re: [Txauth] Additional implementation
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2020 16:30:16 -0000
OK with that. The priority should be on the core of the protocol anyway. Fabien Le lun. 6 juil. 2020 à 18:27, Dick Hardt <dick.hardt@gmail.com> a écrit : > Agreed. > > For those that don't know Wayne, he is pretty involved in the VC efforts. > > On Mon, Jul 6, 2020 at 9:20 AM Wayne Chang <wyc@fastmail.fm> wrote: > >> Hi, just wanted to chime in that in the W3C credentials ecosystem, the >> JWT vs. JSON-LD proofs debate has raged on and consumed a lot of everyone's >> time. There are a lot of industry stakeholders who are skittish around >> requirements to adopt unfamiliar standard, and for some large companies >> involved in that ecosystem JWTs are more familiar than JSON-LD. For the >> Verifiable Credentials spec in particular, the authors decided to support >> both and were careful to ensure this possibility. >> >> This might be a decision better made higher up in the stack than what >> GNAP is trying to accomplish. >> >> On Mon, Jul 6, 2020, at 12:12 PM, Dick Hardt wrote: >> >> Fabien: it would be interesting to see how you think JSON-LD could be >> used in the protocol if you have some ideas on that. In XAuth, I am >> explicit that there are different formats / schema for tokens and claims. >> There is no default, so it is clear how additional formats can be requested >> and returned. >> >> Ben: I think that token formats such as macaroons are out of scope of >> GNAP, or at least the core protocol. The key feature of macaroons is the >> ability to further restrict the authorization. An interesting idea, but >> depends on a shared secret, and I have not heard of deployments. In a quick >> google on macaroons, I came across this talk from Gopher Con >> https://about.sourcegraph.com/go/gophercon-2018-an-over-engineering-disaster-with-macaroons >> . >> >> Justin: good to see we are on the same page on all your points. I'd add >> that we should consider what JSON is used in the protocol to minimize or >> eliminate any impedance mismatch between JSON and CBOR. >> >> /Dick >> >> On Mon, Jul 6, 2020 at 1:19 AM Fabien Imbault <fabien.imbault@gmail.com> >> wrote: >> >> Writing too fast, with an iteration of unrelated examples, did not convey >> the right message. Sorry if it wasn't clear and confusing. We indeed need >> to differentiate between bearer tokens (e.g. JWT, macaroons or even simple >> cookies, etc.) and identity claims (e.g. OIDC claims, linked data proofs, >> etc.). >> I only wanted to say that we need to take into account that there might >> be a variety of formats defined elsewhere. Not only OIDC (for claims) + JWT >> (for access tokens). >> >> Regarding JWT vs macaroons : I would say that JWT are additive, while >> macaroons are organized around caveats (so they're subtractive in a sense). >> But indeed they are both used in similar settings. >> >> Hope that clarifies. >> Fabien >> >> On Mon, Jul 6, 2020 at 12:53 AM Benjamin Kaduk <kaduk@mit.edu> wrote: >> >> Hi Dick, Fabien, >> >> Just to clarify on one point, and check whether I'm confused: >> >> On Fri, Jul 03, 2020 at 06:32:44PM -0700, Dick Hardt wrote: >> > On Fri, Jul 3, 2020 at 1:19 AM Fabien Imbault <fabien.imbault@gmail.com >> > >> > wrote: >> > >> > > On Thu, Jul 2, 2020 at 7:34 PM Dick Hardt <dick.hardt@gmail.com> >> wrote: >> > > >> > >> On Wed, Jun 17, 2020 at 3:47 AM Fabien Imbault < >> fabien.imbault@gmail.com> >> > >> wrote: >> > >> > > >> > >> Just like OAuth 2.0, the access token is opaque to the client, and >> it is >> > >> not specified, so I'm confused what you mean by "other types of >> tokens than >> > >> JWT"? >> > >> >> > >> FI : I mean, for instance, linked data proofs, macaroons, and so on. >> > > >> > >> > I see. When I read 'token', I think of access tokens. You are referring >> to >> > what I would call a claims, which per above are defined somewhere else.. >> >> My understanding was that macaroons, at least, were complete tokens that >> incorporate (at least by reference) multiple claims. So a macaroon and a >> JWT would be analogous in that sense (container holding many claims). I'm >> not sure whether the same holds for a linked data proof (or if it's just a >> way to represent a single claim), though. >> >> Am I confused? >> >> Thanks, >> >> Ben >> >> -- >> Txauth mailing list >> Txauth@ietf.org >> https://www.ietf.org/mailman/listinfo/txauth >> >> >>
- [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Dick Hardt
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Dick Hardt
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Dick Hardt
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Justin Richer
- Re: [Txauth] Additional implementation Benjamin Kaduk
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Dick Hardt
- Re: [Txauth] Additional implementation Wayne Chang
- Re: [Txauth] Additional implementation Dick Hardt
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Fabien Imbault
- Re: [Txauth] Additional implementation Justin Richer