Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

prohibition around "passing through" claims from evidence to attestation results #345

Closed
thomas-fossati opened this issue Dec 8, 2022 · 7 comments
Labels
wontfix This will not be worked on

Comments

@thomas-fossati
Copy link
Contributor

In §4.3 we say:

[...]
They may appear in evidence or attestation results. When these claims
appear in evidence, they SHOULD NOT be passed through the verifier into
attestation results.

I understand the reasoning behind the prohibition, but the prose needs to be tightened up a bit.

First of all, this applies to attestation result that are themselves encoded as a EAT.

Secondly, it only applies in case the evidence claims would end up at the top-level in the EAT claims-set rather than in their own clearly segregated space (e.g., in a sub-map).

If the two condition hold, these claims MUST NOT (rather than SHOULD NOT) be copied as-is, because the EAT carrying attestation results could have its own and they would clash.


Note: In our EAT attestation result we do copy the evidence profile claim, but that's completely separate from the top-level EAT profile so there's no clash nor ambiguity.

@gmandyam gmandyam added the wontfix This will not be worked on label Dec 8, 2022
@gmandyam
Copy link
Collaborator

gmandyam commented Dec 8, 2022

Added 'wontfix' label for now, but please take this to the WG to ensure consensus before making this a MUST requirement.

@gmandyam
Copy link
Collaborator

gmandyam commented Dec 8, 2022

When using the FIDO model for Relying Party (as an example), the verifier is within the boundary of the RP and can process top-level claims, yet may still be relayed as is within the RP context. It is up to the implementation, as FIDO certification programs place no such requirement on existing attestation formats. However, making this a "MUST NOT" requirement (at least without considerably more explanation than what has been proposed in this issue) may mislead developers in the FIDO context - if the claim is passed as is within the RP security boundary from an integrated verifier then it does not appear to have any drawback. Since EAT is meant to target different standards and associated ecosystems (e.g. FIDO, GlobalPlatform, etc.), the SHOULD requirement appears to be sufficient.

@thomas-fossati
Copy link
Contributor Author

thomas-fossati commented Dec 8, 2022

Thanks for articulating the FIDO use case.

What about:

MUST NOT unless:
* [FIDO-like situations]
* [evidence claims are segregated and therefore cannot clash with AR claims]
* [AR is not in EAT format and therefore there is no clash risk]

What is missing is a rationale for allowing exceptions, which should be present (or self-evident) when a SHOULD is used.

@carl-wallace
Copy link
Collaborator

Four ways forward have been discussed:

  • Change SHOULD NOT to MUST NOT
  • Augment SHOULD NOT to require a profile to describe why SHOULD NOT is ignored
  • No change
  • Remove 2119 language from 4.3

@thomas-fossati
Copy link
Contributor Author

Four ways forward have been discussed:

  • Augment SHOULD NOT to require a profile to describe why SHOULD NOT is ignored

☝️

@laurencelundblade
Copy link
Collaborator

I've proposed removing the sentence entirely and relying on 1.3.1 in #360. Read the PR for more justification.

@laurencelundblade
Copy link
Collaborator

Fixed with #360

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
wontfix This will not be worked on
Projects
None yet
Development

No branches or pull requests

4 participants