Re: [Txauth] Additional implementation

Fabien Imbault <fabien.imbault@gmail.com> Mon, 06 July 2020 16:30 UTC

Return-Path: <fabien.imbault@gmail.com>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF7CA3A16E7 for <txauth@ietfa.amsl.com>; Mon, 6 Jul 2020 09:30:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SPjbk19ld_22 for <txauth@ietfa.amsl.com>; Mon, 6 Jul 2020 09:30:13 -0700 (PDT)
Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5C1A3A16E0 for <txauth@ietf.org>; Mon, 6 Jul 2020 09:30:13 -0700 (PDT)
Received: by mail-io1-xd2d.google.com with SMTP id o5so39904356iow.8 for <txauth@ietf.org>; Mon, 06 Jul 2020 09:30:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9Fi2zqffl7aiBrCMkNAWKFNJ87K93W8VVbeyyfJthM8=; b=CKj8Ad7aJC/EjZ3x5jJbE3+BMcEfiG1pHuDuStYom1M6SCXsCxTkW7JVVpoOHvDjdR 1dybZNKQh/jdEDxCYhZqogx9IjuAokeik+0mRfCeTN/WFbiFmRp7y2WyP+eUV6qyMF2y DPsKjnBlcvlZw26qYIIf5vPKKyvg3qDuSQ6lNu0B3mRUwNu8PEYynQvMs8wTM566zSft EXwHiPIRFLvbw0XbR04ixImc+Gi6qeJCU37OWs9yhjzyukb8Da361hu3e7AK73wrfHNe tvam+ZentZjl16e5sqcnL+Ftgn3/0qsAlnjVBg00lkmT6V5B66LdxM7mEnPK5v7tE4eb AuKg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9Fi2zqffl7aiBrCMkNAWKFNJ87K93W8VVbeyyfJthM8=; b=Pmi1Km9I4PV8OVrRQrzmK590kLVTBi1oDngNty/G2w7SZuqfzF527YojZKdBhDIFpD sRanqtEyK0EAy3shBGQp5I4zT972PjBAgGbolkN98fF7IMVr6xRUEj4kykoxklW/qCBr a1yvKNn1yTzSLrpMHFFPUXnbSKZm5yAAViG7R4bapjc1DqgDd/Ne+D9OK0tG7GtB2hgG XaZ0ZS0dYqJN4diyNNsGdLHnLTiGT5RYyZfqxChhXfZrXZ1O/jOKpgYHUM6If/TJAWaN elTzabXdDQaaaJqTp/NwPS7XMPx3MOkQjdpwupUdVfT3IaNeEkPEmgo2PxuHp8dIjeij yZcA==
X-Gm-Message-State: AOAM533C6yL5MoLT78u3kz6a4C9t1RLG1Vfl5ysCEuB1HQ3CLhsBXuWX VLJT2fR4xiSniF8ytj2eJqFI0PjrM7xOQfbsjlY=
X-Google-Smtp-Source: ABdhPJwu76YWkfTdX+/fUO9MZUClxxiEHLR2NtbIYcnFoWqX/dLbbvvE/tizt5wrHN+SqtUfmwstUHiQz0vYCXffLDc=
X-Received: by 2002:a5d:8f98:: with SMTP id l24mr25927383iol.141.1594053012927; Mon, 06 Jul 2020 09:30:12 -0700 (PDT)
MIME-Version: 1.0
References: <CAM8feuRA1VfPs6bdrGgssBeBNe4wPySHjKcjiP6HexKMUff4DQ@mail.gmail.com> <CAD9ie-t7Lzt8S09YKPqwhc__7fKU6XpsyL1m8CGYUqfQwj8+ww@mail.gmail.com> <CAM8feuQK7HnKWd4TuusKy6z5q0K8V1+fO7xdqnLwOckThgtfNw@mail.gmail.com> <CAM8feuT5VO3w-PJWX-SWL0tdoCH4TfzfTnabD5kNLfZ=T8nAZw@mail.gmail.com> <CAD9ie-vUGGRcsv2mC6OD=p2P-jRLbpWo1dOfq3AVYc9gU1S8hA@mail.gmail.com> <CAM8feuRc_arjH-mKyXo+4k_PzRZ0Pq83fkNsN3_YM0mZ8VmmMg@mail.gmail.com> <CAD9ie-un7KEtreop+CYgkds5R89Xc26qCxt5Zd9zHRzY9UEH5Q@mail.gmail.com> <20200705225343.GQ16335@kduck.mit.edu> <CAM8feuTBw+ZqMpEpsYMkEKbytWA227NcMNHp00R7s0jFhcEXjw@mail.gmail.com> <CAD9ie-vmrb+Qa2VEAL9BbSTh8f8oqSBRrXZgzQ2aSSsQZLmu8w@mail.gmail.com> <e864b497-be5a-4feb-982f-4acfbff96725@www.fastmail.com> <CAD9ie-s-QKx_j3-AkLmRfo7e47M_HPodYB8_Q3ni4wkEkAjAEQ@mail.gmail.com>
In-Reply-To: <CAD9ie-s-QKx_j3-AkLmRfo7e47M_HPodYB8_Q3ni4wkEkAjAEQ@mail.gmail.com>
From: Fabien Imbault <fabien.imbault@gmail.com>
Date: Mon, 06 Jul 2020 18:30:00 +0200
Message-ID: <CAM8feuRhOtAX+g0AkgbNuTNEEh5YxY_9tBG+=JhkUvJ5NueqSA@mail.gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Cc: Wayne Chang <wyc@fastmail.fm>, Benjamin Kaduk <kaduk@mit.edu>, txauth@ietf.org
Content-Type: multipart/alternative; boundary="00000000000096bb0005a9c86312"
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/Mf0zgC-65FFK1CKKOhrgl6bLII0>
Subject: Re: [Txauth] Additional implementation
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Jul 2020 16:30:16 -0000

OK with that. The priority should be on the core of the protocol anyway.
Fabien

Le lun. 6 juil. 2020 à 18:27, Dick Hardt <dick.hardt@gmail.com> a écrit :

> Agreed.
>
> For those that don't know Wayne, he is pretty involved in the VC efforts.
>
> On Mon, Jul 6, 2020 at 9:20 AM Wayne Chang <wyc@fastmail.fm> wrote:
>
>> Hi, just wanted to chime in that in the W3C credentials ecosystem, the
>> JWT vs. JSON-LD proofs debate has raged on and consumed a lot of everyone's
>> time. There are a lot of industry stakeholders who are skittish around
>> requirements to adopt unfamiliar standard, and for some large companies
>> involved in that ecosystem JWTs are more familiar than JSON-LD. For the
>> Verifiable Credentials spec in particular, the authors decided to support
>> both and were careful to ensure this possibility.
>>
>> This might be a decision better made higher up in the stack than what
>> GNAP is trying to accomplish.
>>
>> On Mon, Jul 6, 2020, at 12:12 PM, Dick Hardt wrote:
>>
>> Fabien: it would be interesting to see how you think JSON-LD could be
>> used in the protocol if you have some ideas on that. In XAuth, I am
>> explicit that there are different formats / schema for tokens and claims.
>> There is no default, so it is clear how additional formats can be requested
>> and returned.
>>
>> Ben: I think that token formats such as macaroons are out of scope of
>> GNAP, or at least the core protocol. The key feature of macaroons is the
>> ability to further restrict the authorization. An interesting idea, but
>> depends on a shared secret, and I have not heard of deployments. In a quick
>> google on macaroons, I came across this talk from Gopher Con
>> https://about.sourcegraph.com/go/gophercon-2018-an-over-engineering-disaster-with-macaroons
>> .
>>
>> Justin: good to see we are on the same page on all your points. I'd add
>> that we should consider what JSON is used in the protocol to minimize or
>> eliminate any impedance mismatch between JSON and CBOR.
>>
>> /Dick
>>
>> On Mon, Jul 6, 2020 at 1:19 AM Fabien Imbault <fabien.imbault@gmail.com>
>> wrote:
>>
>> Writing too fast, with an iteration of unrelated examples, did not convey
>> the right message. Sorry if it wasn't clear and confusing. We indeed need
>> to differentiate between bearer tokens (e.g. JWT, macaroons or even simple
>> cookies, etc.) and identity claims (e.g. OIDC claims, linked data proofs,
>> etc.).
>> I only wanted to say that we need to take into account that there might
>> be a variety of formats defined elsewhere. Not only OIDC (for claims) + JWT
>> (for access tokens).
>>
>> Regarding JWT vs macaroons : I would say that JWT are additive, while
>> macaroons are organized around caveats (so they're subtractive in a sense).
>> But indeed they are both used in similar settings.
>>
>> Hope that clarifies.
>> Fabien
>>
>> On Mon, Jul 6, 2020 at 12:53 AM Benjamin Kaduk <kaduk@mit.edu> wrote:
>>
>> Hi Dick, Fabien,
>>
>> Just to clarify on one point, and check whether I'm confused:
>>
>> On Fri, Jul 03, 2020 at 06:32:44PM -0700, Dick Hardt wrote:
>> > On Fri, Jul 3, 2020 at 1:19 AM Fabien Imbault <fabien.imbault@gmail.com
>> >
>> > wrote:
>> >
>> > > On Thu, Jul 2, 2020 at 7:34 PM Dick Hardt <dick.hardt@gmail.com>
>> wrote:
>> > >
>> > >> On Wed, Jun 17, 2020 at 3:47 AM Fabien Imbault <
>> fabien.imbault@gmail.com>
>> > >> wrote:
>> >
>> > >
>> > >> Just like OAuth 2.0, the access token is opaque to the client, and
>> it is
>> > >> not specified, so I'm confused what you mean by "other types of
>> tokens than
>> > >> JWT"?
>> > >>
>> > >> FI : I mean, for instance, linked data proofs, macaroons, and so on.
>> > >
>> >
>> > I see. When I read 'token', I think of access tokens. You are referring
>> to
>> > what I would call a claims, which per above are defined somewhere else..
>>
>> My understanding was that macaroons, at least, were complete tokens that
>> incorporate (at least by reference) multiple claims.  So a macaroon and a
>> JWT would be analogous in that sense (container holding many claims).  I'm
>> not sure whether the same holds for a linked data proof (or if it's just a
>> way to represent a single claim), though.
>>
>> Am I confused?
>>
>> Thanks,
>>
>> Ben
>>
>> --
>> Txauth mailing list
>> Txauth@ietf.org
>> https://www.ietf.org/mailman/listinfo/txauth
>>
>>
>>