There appears to be a duplicate claim registration requested.  In:

   Claim Name: and Claim Description: Logical AND JWT Claim Name: N/A
   Claim Key: TBD (greater than 285) Claim Value Type(s): array Change
   Controller: IETF

   Claim Name: enc Claim Description: Logical AND JWT Claim Name: N/A
   Claim Key: TBD (greater than 285) Claim Value Type(s): array Change
   Controller: IETF

Both the claims “and” and “enc” have the same description.

                                                                -- Mike

From: Chris Lemmons <[email protected]>
Sent: Thursday, October 24, 2024 1:33 PM
To: [email protected]
Subject: [COSE] Re: Interest for draft-lemmons-composite-claims-01

It's been a while, but I've updated the Composite Claims document based on much 
of the feedback I've received from this group. I went ahead and renamed it to 
include the group name so it's easier for folks to notice that it's here.

https://datatracker.ietf.org/doc/draft-lemmons-cose-composite-claims/00/

The new draft has CDDL to more clearly communicate the formats as well as 
significantly expanded examples demonstrating how they can be used.

On Fri, Oct 27, 2023 at 3:21 AM Chris Lemmons 
<[email protected]<mailto:[email protected]>> wrote:
Yup! Those are both relevant and useful, though they don't support exactly the 
same use cases.

In particular, SD-CWTs don't quite work for the bearer tokens I'd like to use 
because I'd like the _issuer_ to deny access to the non-disclosed claim 
_values_. The bearer needs to not have to modify their token. Additionally, I 
need the relying party to be able to read the claim key so they can tell if the 
stuff inside the envelope might be a problem. A relying party that doesn't care 
what the identity of the bearer is might accept a token that has an envelope 
with an identity claim inside. A relying party that does care might reject the 
request if they can't open the envelope to verify the identity.

I hadn't seen the JPTs before, but the Design Considerations section does a 
good job of highlighting where these approaches differ. For example, conveying 
claim values from issuer to relier without revealing them to the bearer is one 
of the goals of this envelope and that should be called out because it has both 
security and privacy implications.

On Thu, Oct 26, 2023 at 3:27 PM Orie Steele 
<[email protected]<mailto:[email protected]>> wrote:
Hey Chris!

Glad to see the draft : )

I am very interested in this, and look forward to hearing from others, 
regarding the approach in the draft.

Because this draft comments on both signatures and encryptions in relation to 
CWT claims I wanted to share 2 other related threads for folks who are 
interested in the general properties of disclosure and linkability:

1. https://datatracker.ietf.org/doc/draft-prorock-cose-sd-cwt/ (like 
https://datatracker.ietf.org/doc/draft-ietf-oauth-selective-disclosure-jwt/ but 
for CWT).
2. https://datatracker.ietf.org/doc/html/draft-ietf-jose-json-proof-token-02 ( 
has selective disclosure and unlinkability capabilities, which you might be 
interested in leveraging, alongside or instead the logical operators)

Regards,

OS

On Thu, Oct 26, 2023 at 4:00 PM Chris Lemmons 
<[email protected]<mailto:[email protected]>> wrote:
Link up front: https://datatracker.ietf.org/doc/draft-lemmons-composite-claims/

This is new work I'd like to see if there is interest in. I have a
specific need for these particular CWT claims, but they're completely
general and not specific to my use-case. I have a draft linked above,
but the core concept is that sometimes, you need to compose claims
with boolean logic or encrypt the claim contents.

For example:

I am Chris or David, but I decline to tell you which. If that's ok
with you, you can accept my credential.

Or to encrypt a claim, consider:

I have a bearer token with a claim about who I am, but it is
encrypted, and a claim for what I am authorized to access, which is in
the clear. A processor that only cares about the latter doesn't need a
decryption key for the former, allowing the token to be processed by
an entity without revealing the identity to the processor.

And lastly, it defines a crit claim for cwts, which doesn't exist yet.

I think this document should be very simple and direct in scope. It
shouldn't need to go into detail about all the possible way these
elements can be composed. It just needs to register the compositions
and explain how they can be safely used and how they must be
processed.

What are your thoughts? Would it be worth a few minutes of agenda at
118 to explain and answer questions, if we have time available?

_______________________________________________
COSE mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/cose


--



ORIE STEELE
Chief Technology Officer
www.transmute.industries<http://www.transmute.industries/>

[https://ci3.googleusercontent.com/mail-sig/AIorK4xqtkj5psM1dDeDes_mjSsF3ylbEa5EMEQmnz3602cucAIhjLaHod-eVJq0E28BwrivrNSBMBc]<https://transmute.industries/>
_______________________________________________
COSE mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to