Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

are there any special privacy issues around the nonce claim? #399

Closed
mcr opened this issue Feb 1, 2022 · 5 comments
Closed

are there any special privacy issues around the nonce claim? #399

mcr opened this issue Feb 1, 2022 · 5 comments

Comments

@mcr
Copy link
Collaborator

mcr commented Feb 1, 2022

The challenger could inject identifying information into the nonce claim.
Do you need to say something specific about this?

@dthaler
Copy link
Collaborator

dthaler commented Feb 1, 2022

I think this discussion belongs in the document that defines the nonce claim (EAT) not the arch doc per se. Same for any other specific claims that might have similar issues.

@gmandyam
Copy link

gmandyam commented Feb 1, 2022

I think this discussion belongs in the document that defines the nonce claim (EAT) not the arch doc per se. Same for any other specific claims that might have similar issues.

I think if a discussion regarding privacy for replay protection mechanisms is required, then all documents that EAT inherits from should address this. EAT already inherits the jti/cti claims from RFC 7519/8392 respectively. There is no specific privacy discussion in those documents regarding these claims. Moreover, the cti/jti claims can be client-originated (potentially internal to entity) and can certainly be used for extraction of PII by bad actors, while a nonce is expected to be verifier-generated (i.e. external to entity).

In short, a privacy discussion should cover all anti-replay mechanisms that are possible with CWT/JWT's, not just the claims introduced in EAT. In that regards, the EAT document may not be the best place for this discussion. Nevertheless I have made a first attempt: see ietf-rats-wg/eat#164.

@thomas-fossati
Copy link
Collaborator

I think this discussion belongs in the document that defines the nonce claim (EAT) not the arch doc per se. Same for any other specific claims that might have similar issues.

The reason I brought the issue here is that the nonce is introduced in Section 10.2 of the architecture and since all RATS documents are supposed to inherit from here, it sounded like a good place to discuss the point once and let downstream docs reference it as many times as needed.

Another convenient place where the privacy discussion can be factored out could be Section 7.1 of the interaction models.

BTW, I have raised a related issue in the DAA repo.

@thomas-fossati thomas-fossati changed the title are there any special privacy issues around the nonced claim? are there any special privacy issues around the nonce claim? Feb 2, 2022
@mcr
Copy link
Collaborator Author

mcr commented Feb 8, 2022

@mcr
Copy link
Collaborator Author

mcr commented Feb 8, 2022

Discussion of attack in call:

If a Verifier includes the IP address of the Attester in the nonce used for freshness challenge, encrypted, then it will appear to the Attester and possibly some audit process that no PII was leaked. However, if the symmetric key used for generated this nonce is later made available to some uber-observer, that they could then pull the PII (IP address) out of the audit trail.

DAA/reference-interaction-model could deal with the scenario where the Attester is suspicious of the Verifier.
Consensus that this does not require changes to the document.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants