Those changes off git hub have not been shared with the group and are not 
necessarily approved. 

Phil

On 2013-06-04, at 11:03, "Anganes, Amanda L" <aanga...@mitre.org> wrote:

> Note that this review applies to the latest spec edits from Justin's Github, 
> which can be found here: https://github.com/jricher/oauth-spec. The –12 
> revision has not been published yet, but Justin asked me to review based off 
> of what was in the tracker, since it is more up-to-date.
> 
> --Amanda
> 
> From: <Anganes>, "Anganes, Amanda L" <aanga...@mitre.org>
> Date: Tuesday, June 4, 2013 1:56 PM
> To: "oauth@ietf.org" <oauth@ietf.org>
> Subject: LC Review of draft-ietf-oauth-dyn-reg-12
> 
> [[Apologies if you receive this twice, I accidentally sent this from one of 
> my other email addresses this morning (Outlook seems to have been confused).]]
> 
> Hello,
> 
> I have reviewed the Dynamic Registration draft and offer some comments below:
> 
> After section 1.2, I suggest adding a flow diagram (similar to those in the 
> core OAuth 2.0 spec), showing the interaction of the client/developer with 
> the respective endpoints, and the requests and responses involved. I think 
> this will make the spec easier to read. 
> 
> Inside the 3rd paragraph of section 1.3, there is text buried that talks 
> about client credential rotation (client_secret and Registration Access 
> Token). I think this notion of secret rotation should be called out in its 
> own paragraph or subsection and  labeled as such. Suggested text (I'm not 
> sure where it should go):
> 
> Section X.X Client Credential Rotation
> The Authorization Server may rotate the Client's issued client_secret and/or 
> Registration Access Token. The client_secret MAY be rotated at any time, in 
> which case the Client will likely discover that their secret has expired via 
> attempting and failing to make a request. The Registration Access Token 
> SHOULD only be rotated in response to an update or read request, in which 
> case the new Registration Access Token will be returned in the response back 
> to the Client. The Client can check their current credentials at any time by 
> performing a READ or UPDATE operation at the Client Configuration Endpoint.
> 
> Section 3 Client Registration Endpoint
> 
> This section should use the phrase "this endpoint may be open, or it may be 
> an OAuth 2.0 Protected Resource", rather than just stating that it may accept 
> an initial token. I *think* that the choice is an either/or  for a given 
> server (ie, a server cannot offer both open and protected registration), but 
> that should be clarified as well. 
> 
> In the 4th paragraph, the final sentence ("As such, the Client Configuration 
> Endpoint MUST…") refers to the Configuration endpoint, not the Registration 
> endpoint. The text is already in Section 4 so it should just be deleted here. 
> 
> Section 3.1 Client Registration Request
> 
> The lead-ups to the two example requests are phrased oddly. The difference 
> between the two sample requests is not whether the client has a token, it's 
> whether the endpoint is open or protected. Suggest changing them to "For 
> example, if the Client Registration Endpoint supports open registration, the 
> client could send the following request" and "Alternatively, if the endpoint 
> is an OAuth 2.0 protected resource, the client MUST include an OAuth 2.0 
> Access Token/the Initial Access Token in its request, presented as a Bearer 
> token using the Authorization header according to RFC6749." (My phrasing at 
> the end regarding how to present the AT may be off; point is that it should 
> be called out.)
> 
> Nits in section 7 Security Considerations:
> 
> 2nd paragraph, first sentence: "…requests to the *Client* Registration 
> Endpoint"
> 
> 6th paragraph, first sentence: "…the Registration Access Token should not 
> expire…" I think this should be a SHOULD NOT? 
> Same paragraph, 4th sentence has a non-capitolized "client" that should be 
> "Client" (although, after reading Hannes' review, maybe the capitalized 
> instances should all be lowercased instead). 
> 
> I also second Hannes' comment that the RFC 2119 language feels off throughout 
> the spec, suggest doing a careful read to check those.
> 
> Finally, to address the Initial Access Token / Registration Access Token 
> discussion that has been ongoing:
> 
> My initial response after reading this draft (and having followed the 
> discussion) was to say, remove the "Initial Access Token" term completely and 
> instead just clarify the text to say that "the Client Registration Endpoint 
> MAY be an OAuth 2.0 protected resource, but the details of how a given client 
> or developer goes about acquiring an Access Token for use at this endpoint is 
> out-of-scope". I spoke to Justin about this and he pointed out that this term 
> was only added recently, and it was added because of confusion around how the 
> Client Registration Endpoint was defined, and what it means to authenticate 
> to it. I don't think the new name/definition/explanation has helped; but the 
> previous drafts were also missing the "OAuth 2.0 protected resource" 
> language. To be clear, I think this functionality is absolutely necessary, 
> but we need to clarify its explanation
> 
> On the other hand, the Registration Access Token seems very clear to me. I 
> think that term should be called out as a named entity, since it is 'special' 
> - it's not issued by a token endpoint, but by the Client Registration 
> Endpoint.
> 
> I see a few options that might help:
> 
> 1) Perhaps "Initial Access Token" is a bad name. Unfortunately, I think the 
> right names are "Registration Access Token" for accessing the Registration 
> Endpoint, and "Configuration Access Token" for accessing the Configuration 
> Endpoint. This would require changing code, since the configuration token is 
> returned in the Client Registration Response. 
> 
> 1.a) The examples in Appendix B only use the IAT for Developer 
> authentication/tracking (all clients registered using the same IAT can be 
> traced to the developer that was issued that particular token). Is that the 
> only use case? If there is always a developer in the loop in the protected 
> case, then "Developer Access Token" might be appropriate. This is less 
> generic than the suggestion above, but would not require changing code and 
> might be an improvement over what's there now.
> 
> 2) Perhaps if the spec language were clarified and used the "OAuth 2.0 
> protected resource" language, the Initial Access Token term could be removed 
> from the document entirely. I don't think the previous drafts got it right, 
> but I think we can do better than those explanations while still avoiding 
> giving a fancy name to something that is *just* an OAuth 2.0 Access Token. 
> 
> --Amanda
> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to