Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible conflict between requirement 6.3.4.7.3.ii and some of the revocation mechanisms presented in the ARF #147

Open
joelposti opened this issue Mar 12, 2024 · 2 comments

Comments

@joelposti
Copy link
Contributor

In section 6.3.4.7 of the ARF there is the following requirement:

3.ii. Any attestation identifiers and other values used for enabling revocation checking SHALL NOT allow Relying Parties to correlate (and thus track) the User, even if they collude with other Relying Parties.

Section 6.3.4.8 of the ARF presents a number of possible revocation mechanisms such as Attestation Status List and Online Attestation Status Protocol. It is difficult to see how the presented mechanisms, with the exception of the short-lived attestations mechanism and perhaps the OASP stapling, fulfill the requirement because they rely on the fact that the attestation has some sort of revocation-related identifier. That identifier can be used by the Relying Party for correlating the User.

Should the requirement be relaxed or dropped? Or should more advanced revocation mechanisms be used?

If more advanced revocation mechanisms are used it could be that the requirement 6.3.4.7.8 gets in the way next.

  1. The revocation mechanism SHOULD be mature, meaning that many different parties have experience with implementing and operating the mechanism.
@samuelmr
Copy link

samuelmr commented Apr 6, 2024

Would it make sense to have different kinds of attestations (credentials) with different revocation mechanisms?

If you present an attestation of your bank account number or a credential proving that you own a car with a specific license plate number, it doesn't make much sense to set strict requirements for non-traceability of the revocation, since the verifiers get identifying information as attribute values. The same, of course, applies to use cases where the user uses their PID for authentication.

The issuer of a credential could label the credentials they issue using a three-tier classification:

  1. non-traceable (the credential doesn't contain uniquely identifying attribute values, including revocation data)
  2. potentially traceable (the credential contains selectively disclosable attributes that can be used for tracking if disclosed)
  3. traceable (the use of the credential can be tracked by colluding verifiers since it may contain identifying information

@pinamiranda
Copy link
Contributor

Thank you for bringing this to our attention. The requirement 6.3.4.7.3.ii will be removed in the next version of ARF (ARF v1.4).
If you encounter any further issues, please don't hesitate to let us know.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants