Re: [GNAP] Human rights perspective on W3C and IETF protocol interaction

Justin Richer <jricher@mit.edu> Wed, 05 January 2022 22:33 UTC

Return-Path: <jricher@mit.edu>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D479B3A011F for <txauth@ietfa.amsl.com>; Wed, 5 Jan 2022 14:33:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.484
X-Spam-Level:
X-Spam-Status: No, score=-1.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, KHOP_HELO_FCRDNS=0.399, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8u61Ylrya_VE for <txauth@ietfa.amsl.com>; Wed, 5 Jan 2022 14:33:52 -0800 (PST)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF46B3A0115 for <txauth@ietf.org>; Wed, 5 Jan 2022 14:33:51 -0800 (PST)
Received: from smtpclient.apple (static-71-174-62-56.bstnma.fios.verizon.net [71.174.62.56]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 205MXhLl028972 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 5 Jan 2022 17:33:44 -0500
From: Justin Richer <jricher@mit.edu>
Message-Id: <A4FA7445-31A5-4B7A-BE30-EB47168F8ED5@mit.edu>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E9A73FF4-3B21-4F11-973B-E642633303E3"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Wed, 05 Jan 2022 17:33:43 -0500
In-Reply-To: <CAN8C-_+eSZCohY7QDC5La90=14=sjpo5pELOUqUdb7PhRzhXxw@mail.gmail.com>
Cc: Adrian Gropper <agropper@healthurl.com>, Bob Wyman <bob@wyman.us>, Alan Karp <alanhkarp@gmail.com>, GNAP Mailing List <txauth@ietf.org>, W3C Credentials Community Group <public-credentials@w3.org>
To: Orie Steele <orie@transmute.industries>
References: <CANYRo8i=H3p23boH4OQ6sCXds8ADqaizwDHebE6-xMP2mZ5QEg@mail.gmail.com> <CAA1s49VWs_Qe9qryJOwWG4oHTS6Wa-6p6jAVSDT6Vqn4cwdUwQ@mail.gmail.com> <CANYRo8jUaP=9eX3HJWhFOmMCeaU7gkTQ9FdLg3=E61AUFQv8qQ@mail.gmail.com> <CANpA1Z2WBT69AJ6ynsYCHuOAAoB7F3fn+ebtV3fjBdeYTT-D+Q@mail.gmail.com> <CANYRo8gnx0nFje=GfqUVUESkKpeJB4Ln3Pa2QYt_iFMkrPBsLQ@mail.gmail.com> <CAA1s49UdeVBgc+rzOEJ+LcAP8g4gXX9XnZH2m+4=oOcFy3AvCg@mail.gmail.com> <CANYRo8iDA-EGK589VdcNU8PMK2BQZwT19Bxsav2HSGwhyBL=4A@mail.gmail.com> <CAN8C-_+eSZCohY7QDC5La90=14=sjpo5pELOUqUdb7PhRzhXxw@mail.gmail.com>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/h2r3LCbgyl3HKOaMET55B4bUz0g>
Subject: Re: [GNAP] Human rights perspective on W3C and IETF protocol interaction
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: GNAP <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Jan 2022 22:33:57 -0000

Federated identity and delegated access are separate concerns, please be careful not to conflate them. The choice of a service to delegate login — which GNAP does not define — is the choice of that service.

And in fact, the loss of services is exactly the kind of thing that, I believe, Adrian is asking about. In GNAP core, we improve this over OAuth by moving away from the “go to a web page on the AS” assumptions and allowing a more nuanced and varied means of interaction and consent. Technologies like VC fit really well here: if I can present a VC to the AS, then the AS doesn’t need to “log me in” in a traditional OAuth sense.

https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-08.html#name-determining-authorization-a <https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-08.html#name-determining-authorization-a>

As I’ve explained on several DID, VCAPI, and related calls so far, this connection inbound to the AS is one of the most important ways that these items can be connected. If I have an accepted and standard way to get my consent, rights, and attributes into the AS without the AS needing me to make an account and log in, the more distributed the end system ends up being :without: requiring an RS to accept tokens from an arbitrary AS. We know from past attempts that this latter request is a bridge too far for nearly every RS. Getting the AS to accept external inputs and interactions, however, is a well-established pattern that GNAP is codifying and making explicitly extensible.

Also a note about IETF process for the W3C folks that this document is not simply an “internet-draft” from an individual (which has about as much weight as a web-page) but an active document of an active working group, and as such has more normative standards weight than any Note the CCG is allowed to produce within the W3C. This is not to disparage the CCG at all, but just to point out that there are different classes of work here, and it’s easy to confuse the two.

Also since this seems to be confusing, the expiration date is an artifact of the group currently focusing on the core document, and as discussed publicly at the WG meetings, the resource server document is next on the queue. As I’m sure you are aware yourself, Orie, there are only so many cycles that a group can apply to work in progress and be effective. It is not an indication that the WG has abandoned or plans to abandon the resource servers draft.

 — Justin

> On Jan 5, 2022, at 5:12 PM, Orie Steele <orie@transmute.industries> wrote:
> 
> I wonder how many services President Trump lost access to when they banned his twitter account.
> 
> Can someone explain how GNAP improves on OAuth in this regard?
> 
> I can't find anything here: https://datatracker.ietf.org/doc/html/draft-ietf-gnap-resource-servers#section-7 <https://datatracker.ietf.org/doc/html/draft-ietf-gnap-resource-servers#section-7>
> 
> Also heads up that this "Internet-Draft" of "Intended status: Standards Track" expires on 13 January 2022.
> 
> 
> OS
> 
> 
> ᐧ
> 
> On Wed, Jan 5, 2022 at 3:46 PM Adrian Gropper <agropper@healthurl.com <mailto:agropper@healthurl.com>> wrote:
> Bob,
> The design principle is Separation of Concerns (separating control from possession). 
> 
> The human rights issue is to mitigate the often absolute sovereignty of the Issuer by making it obvious in both the technical and the regulatory sense when the Issuer is reducing the capacity or choice of the Subject through mandates like OAuth client credentials. GNAP, as opposed to OAuth, makes it very obvious when delegation is restricted without justification. As such, it will tend to keep the Issuers more honest and make them more transparent and easier to judge in terms of human rights.
> 
> Adrian
> 
> On Wed, Jan 5, 2022 at 4:26 PM Bob Wyman <bob@wyman.us <mailto:bob@wyman.us>> wrote:
> Adrian,
> I'm confused by your latest comments. Could you please explain how CCG's adoption of GNAP would facilitate "a focus on human rights as a design principle" (i.e. the goal you stated in your original message) Please forgive me if I'm missing something important in what you've said.
> 
> bob wyman
> 
> 
> On Wed, Jan 5, 2022 at 3:57 PM Adrian Gropper <agropper@healthurl.com <mailto:agropper@healthurl.com>> wrote:
> In this thread, my focus is the relationship between CCG and GNAP. RFCs are considered in the broader context of an Internet security layer such as Sam Smith and KERI are addressing. My proposal is that CCG will be well-served by adopting GNAP (and RAR) in as many protocol efforts as it can. If CCG does not outsource some protocol concerns to GNAP and other RFCs, then I believe other groups will bypass CCG-related protocols as we are already seeing in EU and ISO with mDL. 
> 
> The VC and DID work on data models and related registries is valuable with or without CCG protocol tie-ins. If I were to suggest a formal CCG work item, it would be to develop which specific authorization and authentication protocols should be layered on top of GNAP and RAR.
> 
> Adrian
> 
> On Wed, Jan 5, 2022 at 2:53 PM Alan Karp <alanhkarp@gmail.com <mailto:alanhkarp@gmail.com>> wrote:
> RFCs have a Security Considerations section.  Are you suggesting that these groups include a Human Rights Considerations section in addition?
> 
> --------------
> Alan Karp
> 
> 
> On Wed, Jan 5, 2022 at 7:14 AM Adrian Gropper <agropper@healthurl.com <mailto:agropper@healthurl.com>> wrote:
> Bob's are important questions in the context of our specific protocol work. I do not mean to scope this thread to general W3C or IETF groups or their governance. Bold is used below to link to Bob's specific questions.
> 
> I might also argue to limit the scope to protocols and not VC, DID, biometric templates, or other data models even though effective standards for these drive quantitative and possibly qualitative improvements in the efficiency of surveillance because a common language seems essential to discussing protocols. Adverse consequences of the efficiency of common interoperable language can be mitigated at the protocol level.
> 
> I'm responding in personal terms to Bob's questions. I urge all of us engaged in the protocol engineering effort to bring their own perspective on "Human Rights" and to advocate for specific technical solutions in specific workgroups. For example, I have chosen to focus attention on authorization for verifiable credential issue. I hope others will prioritize human rights impact of authentication protocols especially where biometrics could be involved.
> 
> The specific aspects of our protocol work that give rise to human rights issues relate to the efficiency of standardized digital credentials to human persons. What works for drugs in a supply chain or cattle on a farm can and usually will be misused on people. Also, transferring responsibility from an issuer to a subject of a VC is a burden that needs to be recognized and mitigated. With respect to the UDHRs, I would point to 12 (privacy and confidentiality), 13 (anonymity), 14 (limit the reach of DHS and other state actors), 17 (the right to associate with and delegate to others), 18 (associate with and delegate to communities one chooses), 20 (association, again), 21 (secret elections), 22 (anonymity), 23 (trade unions as delegates), 24 (burden of managing decisions in an asymmetric power relationship with the state or with dominant private platforms), 29 (duties to and scope of the community).
> 
> I'm suggesting that we formally address the issue of human rights as applied to the VC-API standardization process. I'm also suggesting that we use a process in VC-API that formally harmonizes our work with IETF GNAP.
> 
> Adrian
> 
> On Tue, Jan 4, 2022 at 11:45 PM Bob Wyman <bob@wyman.us <mailto:bob@wyman.us>> wrote:
> Adrian,
> Given that you're starting a new thread, I would appreciate it if you could do some context setting and clarifying:
> What do you mean by "Human Rights?" Hopefully, you won't consider that a foolish question. The issue is, of course, that since Internet standards are developed in a multicultural, multinational context, it isn't obvious, without reference to some external authority, what a standards group should classify as a human right. Different cultures and governments tend to differ on this subject... As far as I know, the "best" source of what might be considered a broad consensus definition of human rights is found in the UN's 1948 Universal Declaration of Human Rights <https://www.un.org/en/about-us/universal-declaration-of-human-rights> (UDHR). 
> Does the UDHR contain the full set of rights that you think should be addressed by standards groups? If not, are there additional rights that you think should be considered? 
> In his document, Human Rights Are Not a Bug <https://www.fordfoundation.org/work/learning/research-reports/human-rights-are-not-a-bug-upgrading-governance-for-an-equitable-internet/>, Niels ten Oever refers to the UN Guiding Principles for Business and Human Rights <https://www.ohchr.org/documents/publications/guidingprinciplesbusinesshr_en.pdf>, which adds to the rights enumerated in the UDHR a number of additional rights described in the International Labour Organization’s Declaration on Fundamental Principles and Rights at Work <https://www.ilo.org/declaration/lang--en/index.htm>. Given that you appear to endorse ten Oever's report, do you also propose the same combined set of rights? (ie. UDHR + ILO DFPRW?)
> Some have argued that the Internet introduces a need to recognize rights that have not yet been enumerated either in the UDHR or in any other broadly accepted documents. If this is the case, how is a standards group to determine what set of rights they must respect?
> What specific aspects of the issues being addressed by this community group give rise to human rights issues? Also, if you accept that one or some number of documents contain a useful list of such rights, can you identify which specific, enumerated rights are at risk? (e.g. if the UDHR is the foundation text, then I assume privacy issues would probably be considered in the context of the UDHR's Article 12 <https://www.un.org/en/about-us/universal-declaration-of-human-rights#:~:text=Article%2012,interference%20or%20attacks.>.)
> Are you suggesting that this group should formally address the issue of rights, with some sort of process, or just that we should be aware of the issues?
> ten Oever suggests that "Those who design, standardize, and maintain the infrastructure on which we run our information societies, should assess their actions, processes, and technologies on their societal impact." You apparently agree. Can you say how this should be done?
> The UN Guiding Principles for Business and Human Rights describe a number of procedural steps that should be taken by either governments or corporations. Are you aware of a similar procedural description that would apply to standards groups?
> I think it was in the video that it was suggested that, in Internet standards documents, "a section on human rights considerations should become as normal as one on security considerations." Do you agree? If so, can you suggest how such a section would be written?
> bob wyman
> 
> 
> On Tue, Jan 4, 2022 at 9:05 PM Adrian Gropper <agropper@healthurl.com <mailto:agropper@healthurl.com>> wrote:
> This is a new thread for a new year to inspire deeper cooperation between W3C and IETF. This is relevant to our formal objection issues in W3C DID as well as the harmonization of IETF SECEVENT DIDs and GNAP with ongoing protocol work in W3C and DIF.
> 
> The Ford Foundation paper attached provides the references. However, this thread should not be about governance philosophy but rather a focus on human rights as a design principle as we all work on protocols that will drive adoption of W3C VCs and DIDs at Internet scale.
> 
> https://redecentralize.org/redigest/2021/08/ <https://redecentralize.org/redigest/2021/08/> says:
> 
> Human rights are not a bug
> Decisions made by engineers in internet standards bodies (such as IETF <https://www.ietf.org/> and W3C <https://www.w3.org/>) have a large influence on internet technology, which in turn influences people’s lives — people whose needs may or may not have been taken into account. In the report Human Rights Are Not a Bug <https://www.fordfoundation.org/work/learning/research-reports/human-rights-are-not-a-bug-upgrading-governance-for-an-equitable-internet/> (see also its launch event <https://www.youtube.com/embed/qyYETzXJqmc?rel=0&iv_load_policy=3&modestbranding=1&autoplay=1>), Niels ten Oever asks “how internet governance processes could be updated to deeply embed the public interest in governance decisions and in decision-making culture”.
> “Internet governance organizations maintain a distinct governance philosophy: to be consensus-driven and resistant to centralized institutional authority over the internet. But these fundamental values have limitations that leave the public interest dangerously neglected in governance processes. In this consensus culture, the lack of institutional authority grants disproportionate power to the dominant corporate participants. While the governance bodies are open to non-industry members, they are essentially forums for voluntary industry self-regulation. Voices advocating for the public interest are at best limited and at worst absent.”
> The report describes how standards bodies, IETF in particular, focus narrowly on facilitating interconnection between systems, so that “many rights-related topics such as privacy, free expression or exclusion are deemed “too political””; this came hand in hand with the culture of techno-optimism:
> “There was a deeply entrenched assumption that the internet is an engine for good—that interconnection and rough consensus naturally promote democratization and that the open, distributed design of the network can by itself limit the concentration of power into oligopolies.
> This has not proved to be the case.”
> To improve internet governance, the report recommends involving all stakeholders in decision procedures, and adopting human rights impact assessments (a section on human rights considerations should become as normal as one on security considerations).
> The report only briefly touches what seems an important point: that existing governance bodies may become altogether irrelevant as both tech giants and governments move on without them:
> “Transnational corporations and governments have the power to drive internet infrastructure without the existing governance bodies, through new technologies that set de facto standards and laws that govern “at” the internet not “with” it.”
> How much would having more diverse stakeholders around the table help, when ultimately Google decides whether and how a standard will be implemented, or founds a ‘more effective’ standardisation body instead?
> 
> 
> Our work over the next few months is unbelievably important,
> 
> - Adrian
> 
> 
> 
> -- 
> ORIE STEELE
> Chief Technical Officer
> www.transmute.industries <http://www.transmute.industries/>
> 
>  <https://www.transmute.industries/>