> -----Original Message-----
> From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf
> Of Torsten Lodderstedt
> Sent: Wednesday, July 20, 2011 2:49 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Comments on -18
> 
> section 1.5
> 
> "(A)  The client requests an access token by authenticating with the
>          authorization server, and presenting an authorization grant."
> 
> This statement does not reflect that client authentication is not always
> required.
> 
> Proposal:
> 
> "The client requests an access token by presenting an authorization grant.
> The authorization server may require the client to authenticate as a pre-
> requisite."

The general design for fresh tokens does include authentication. Yes, the 
normative text allows you not to, but this is the general case and I like the 
simpler text for the introduction.

> section 4.1
> 
> "(D)  The client requests an access token from the authorization
>          server's token endpoint by including the authorization code
>          received in the previous step.  When making the request, the
>          client authenticates with the authorization server."
> 
> Same as above. Proposal:
> 
> ".... When making the request, the
>          client may be required to authenticate with the authorization server"

Same. Section 4.1.3 makes this clear.
 
> "(E)  The authorization server authenticates the client, validates the
>          authorization code, and ensures the redirection URI received
>          matches the URI used to redirect the client in step (C)."
> 
> Same as above.
> 
> Additionally, is the URI check also required if the client did not passed a
> redirect uri but relied on its pre-registered redirect_uri?

This is the overview. Section 4.1.3 provides the specific requirements.

> section 4.1.1
> 
> "state" parameter: Would it make sense to elaborate on the usage of this
> parameter and its importance for preventing CSRF attacks (incl. the
> nessessary entropy)? Alternatively, a reference to the security consideration
> section could be added.

I think we got this covered. I rather not start pointing to the security 
section from the sections above.

> section 4.1.3
> 
> "If the client type is private or was issued client credentials ..."
> Isn't the later the most important property of a "private" client? If so, "or 
> was
> issued client credentials" is redundant.

All private clients must authenticate, but also public clients with issued 
credentials.

> section 4.4.3
> 
> "A refresh token SHOULD NOT be included." Why not "MUST NOT"?

This was debated a while back and the consensus was that there is no reason to 
restrict this to a MUST NOT. Someone might even had plans to issue refresh 
tokens using this flow.

> section 5.2
> 
> "The authorization server MAY return an HTTP 401
>                 (Unauthorized) status code to indicate which HTTP
>                 authentication schemes are supported."
> 
> Given the usage of HTTP authentication schemes is the way to authenticated
> client recommended by the spec, status code 401 should be the default
> status code for this kind of error. Usage of status code 400 should be the
> exception.
>
> "unauthorized_client"
> 
> So above - status code 403 seems to be a more appropriate default.

I think this is fine unchanged.

> section 10
> 
> "and furthermore that rotation of the client
>        authentication credentials is impractical."
> 
> What does this mean?

I'll take it out. I don't remember who suggested it (Brian?).

> Please update reference [I-D.lodderstedt-oauth-security] to [I-D.ietf-oauth-
> v2-threatmodel].

Done.

> section 10.2
> 
> last sentence: "... ensure the repeated request comes from an authentic
> client and not an
>     impersonator."
> 
> The authorization server must ensure that the request comes from the same
> client not just any authentic client. So I would propose to adjust the text as
> follows:
> 
> "... ensure the repeated request comes from the original client and not an
>     impersonator."

Ok.

> section 10.3
> 
> "Access token (as well as any type-specific attributes) MUST ..." does "type-
> specific" refer to access token type specific? If so, please add this
> information.

Ok.

> section 10.6
> 
> Please replace the first sentence with the following text:
> 
> "Such an attack leverages the authorization code ..."

That reads funny. How about 'An attacker can leverage...'

EHL

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to