-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Relation of WTE in EU ARF and key attestations in OpenID4VCI #443
Comments
The concept of a single, static WTE is heavily flawed and was criticized by many memberstates. In the following iterations, the ARF authors therefore modified this a little bit (but not yet enough), you can see that Section 6.5.4 Wallet Instance management says "update the WIAs or the WTEs as necessary; see [Topic 9].2", talking in plural. So the fact that the wallet activation issues a single WTE doesn't state that this is the only one being used lateron, otherwise we have a supercookie for all PID/EAA Providers. So I don't see a contradiction here.
As before, for unlinkability reasons you need a fresh WTE for every Issuer anyway. As there are no Proof-of-Association methods described yet, we currently rely on putting multiple keys within the key attestation, which is the basic form of a PoA. The current design of the key attestation and other parts of OpenID4VCI are making it possible to add PoA at a later stage.
As before, I don't see a conflict, as the ARF doesn't strictly say that there is only one WTE.
There are ideas for how to integrate PoA as a new proof_type in the future, but right now its not ready yet. |
We are currently in the process of adopting OpenID4VCI in our national EUDI wallet solution for issuing PIDs. We have reviewed the latest version of the OpenID4VCI spec in relation to key attestations, and we are a bit unsure how the WTE defined in the EU ARF maps to key attestations in OpenID4VCI.
The ARF defines the WTE as the following:
The above happens during activation. A device key pair is generated along with an attestation certificate so that the Wallet Provider can verify the device's capabilities and can verify that the device can appropriately protect PKI keys.
Then, during PID issuance:
We can see the following issues:
What are your views on the above? Are we misinterpreting something? We don't see how the dynamic nature of the ITE/WTE as defined in OpenID4VCI maps to the static nature of the WTE as defined in the ARF.
Do you have any plans to handle Proof of Assocations in the spec?
The text was updated successfully, but these errors were encountered: