Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HDK spec v1 #15

Closed
sander opened this issue Jun 2, 2024 · 8 comments
Closed

HDK spec v1 #15

sander opened this issue Jun 2, 2024 · 8 comments
Assignees

Comments

@sander
Copy link
Owner

sander commented Jun 2, 2024

Work is ongoing in keys.md. It needs significant editorial work:

Questions for the 2024-06-03 meeting:

  1. What do initial reviewers think?
  2. Who is interested in contributing? Who wants to review as well?
@sander sander self-assigned this Jun 2, 2024
@sander sander converted this from a draft issue Jun 2, 2024
@sander
Copy link
Owner Author

sander commented Jun 3, 2024

Discussed 2024-06-03.

@emlun, @ve7jtb (after this week), Juan, Sarah will review.

Specific issues to address in the review, next to general feedback:

  • Is this indeed an application of ARKG, or do ARKG and HDK apply the same primitives that we should extract?
  • OpenID4VCI extension: how to request batch issuance with different contents?
  • Can we reduce the amount of OpenID4VCI endpoints?
  • Do we need to support related keys with different security properties? E.g. require PoP with user verification upon presentation, but PoP without user verification upon repeated issuance using a refresh token in OpenID4VCI.
  • What is the relation with Wallet Instance Attestations? Do HDK replace a need for these?
  • What is the relation with Wallet Trust Evidence?
  • How should wallet revocation work with HDK?
  • Should Efficient mass issuance #1 be in scope of HDK?

Sorry, something went wrong.

@sander
Copy link
Owner Author

sander commented Jun 10, 2024

Discussed 2024-06-10. Reviews still pending.

@sander-cb
Copy link
Collaborator

sander-cb commented Jun 17, 2024

2024-06-17 meeting:

Remco:

  • security/privacy objectives?
  • Add: issuer does not get additional power to leverage presentation to issue presentation on its own, given presentations of other issuers’ attestations (cross-issuer faking of presentations). John: ARKG references may contain a good term.
  • “optionally evidence of security of the blinded private key” – possibly mandatory for EUDI Wallet. Also: how to make it work with existing hardware in practice. Consider if Wallet Provider should be able to issue the WTE, given the root public key – then should be a conscious and known choice.
  • WSCD should meet EAL4+ for LoA High – make explicit how. Paul: how would backup & recovery look (issuers 24/7 online?) – at least for the blinding keys, for the device key could be contentious.
  • Wallet generates seed – how well do these bytes need to be protected; security, privacy implications.
  • “The Credential Issuer SHOULD verify a proof of possession of the provided ARKG key blinding public key.” – when would be a good excuse to not do it? John: possibly when WTE already provides sufficient assurance.

Sorry, something went wrong.

@Sakurann
Copy link

Could someone elaborate on the rationale and ask in the item Can we reduce the amount of OpenID4VCI endpoints?

@sander
Copy link
Owner Author

sander commented Jun 24, 2024

@Sakurann:

Could someone elaborate on the rationale and ask in the item Can we reduce the amount of OpenID4VCI endpoints?

This came up during a review of keys.md § Applying HDK in OpenID for Verifiable Credential Issuance. My proposal was to add a “Multiple Batch Endpoint” to support HDK. Participants told we already have many endpoints, and should look instead if we can reuse and extend any of the existing ones instead.

You’ve mentioned during last week’s ETSI ESI#83 that the OpenID4VCI working group will soon publish a new draft with “Optimizing Issuance of Credential Batches”, and is discussing “Optimizing number of endpoints”. Is there work in progress we can follow?

@sander
Copy link
Owner Author

sander commented Jul 1, 2024

2024-07-01: Micha: big merge done or in progress, simplifying batch endpoints. openid/OpenID4VCI#293

During the 2024-07-01 meeting, we’ve walked through the current simplified spec structure.

@sander
Copy link
Owner Author

sander commented Jul 8, 2024

2024-07-08

  • Micha: make explicit how verifier uses the HDK-Authenticate output, e.g. in the ECDH case (currently implicit)
  • Antoine: mention it can be used purely locally

@sander
Copy link
Owner Author

sander commented Jul 12, 2024

Closing with the 0.1.0 release. Specific comments now have dedicated issues.

@sander sander closed this as completed Jul 12, 2024
@github-project-automation github-project-automation bot moved this from Doing to Done in HDK coordination Jul 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Done
Development

No branches or pull requests

3 participants