Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can we trust metadata? Why? (was: SVG? really? And metadata more broadly) #282

Open
wbl opened this issue Dec 4, 2024 · 13 comments
Open

Comments

@wbl
Copy link

wbl commented Dec 4, 2024

I really don't get why SVG logos for individual fields is supported. Also I'm not sure about the value of this display metadata. Are people going to use it?

@danielfett
Copy link
Member

The title of this issue is not helpful. What is the problem with SVG?

And there are no SVG logos for individual fields, just for the whole type.

Display metadata is already in use in a couple of wallet implementations and I just yesterday spoke to a team implementing an EUDI wallet and they plan to use the display metadata mechanism.

@wbl
Copy link
Author

wbl commented Dec 4, 2024 via email

@danielfett
Copy link
Member

Sorry, is this still related to SVGs?

@wbl
Copy link
Author

wbl commented Dec 4, 2024 via email

@danielfett
Copy link
Member

I think the real question here is - why should anyone trust metadata in general? How can a wallet know that the content is fine to display to the user? This is what must be addressed in the specification. I'll change the title accordingly.

If there are any issues specific to the format of the logo, please file a separate issue.

@danielfett danielfett changed the title SVG? really? And metadata more broadly Can we trust metadata? Why? <strike>SVG? really? And metadata more broadly</strike> Dec 9, 2024
@danielfett danielfett changed the title Can we trust metadata? Why? <strike>SVG? really? And metadata more broadly</strike> Can we trust metadata? Why? (was: SVG? really? And metadata more broadly) Dec 9, 2024
@alenhorvat
Copy link

Metadata is information asserted by the issuer (hence, should be integrity protected, which I believe it is). Issuer must be trusted for the information (credential or the metadata) to be trusted.

@wbl
Copy link
Author

wbl commented Dec 9, 2024

I can trust Alice Co to produce its corporate ids. I can't trust them to create Bob co's corporate ids. Trust is not an absolute, and the text indicating anything about this is not in the security considerations sections and would need to be.

@alenhorvat
Copy link

This is why usually accreditations are introduced (they limit the scope of attestations - e.g., you can only attest information about own employees). Authors will know whether that's in scope or not.

@wbl
Copy link
Author

wbl commented Dec 9, 2024

Once again, that's not in the Security Considerations section. If we wanted it in there we should say "verifiers MUST NOT trust issuers that cannot be trusted to assert anything they please". We should be explicit this is for a very closed system. That's not compatible with a DID world.

Secondly, the accredation is by definition reactive: it looks at policies that existed in the past and are in place. That's not as good as preventing the issue.

We've been through these issues with X509 and browser UI and certificates. We learned a lot. And logos are I think very powerful ways to misdirect users. People will learn to look for them, and then get fooled.

@alenhorvat
Copy link

If I understand correctly, there are two topics to cover

  • identity of the issuer (is the issuer identity self-asserted or is attested by a 3rd party; if so, under which identity framework)
  • what claims the issuer can make about the user
    ?

@wbl
Copy link
Author

wbl commented Dec 9, 2024

That's a different issue, which also should be raised or discussed somewhere. Metadata isn't claims per se. But if you e.g. have a logo that gets displayed, that can be interpreted by a user as a claim.

@alenhorvat
Copy link

Today (at least in eIDAS) signer/issuer information is always expressed in an x509 certificate issued by a trusted authority (issuer/signer information is never self-asserted); Logo could be one of the 'issuer' claims, which brings us to the question: which metadata claims can be made by the issuer.

In governed ecosystems, probably only few, if any, as regulation defines what claims an issuer can make about the user.

@wbl
Copy link
Author

wbl commented Dec 9, 2024

And once again, that is not in the four corners of the text here. I think this is something that also needs to go on the list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants