This is not new contention, look back in the mailing list, been going on for 
quite a while. So far I have only seen 2 replies for implementations. The idea 
is to get things right.

-----Original Message-----
From: oauth-boun...@ietf.org [mailto:oauth-boun...@ietf.org] On Behalf Of Eve 
Maler
Sent: Thursday, August 15, 2013 3:18 PM
To: John Bradley
Cc: m...@gluu.org; oauth@ietf.org
Subject: Re: [OAUTH-WG] OX needs Dynamic Registration: please don't remove!

Agree with John that RFC 6749 is to all intents and purposes final. Also, when 
we have a dyn reg spec whose earliest drafts are several years old, whose 
current draft is implemented by a variety of OAuth, OpenID Connect, and UMA 
developers, whose current design reflects a good deal of healthy consolidation 
of disparate starting points, and for which there's been concrete demand 
expressed on this list, I'm a little surprised that there's this much 
contention about it at this juncture.

        Eve

On 15 Aug 2013, at 1:35 PM, John Bradley <ve7...@ve7jtb.com> wrote:

> I believe it is rare for RFC to move beyond the stage RFC 6749 is currently 
> at so It is to most peoples minds finished.
> 
> I am not against doing future things to improve the spec.  I just suspect 
> that opening that can of worms again will take time.
> 
> John B.
> 
> On 2013-08-15, at 4:23 PM, Phil Hunt <phil.h...@oracle.com> wrote:
> 
>> John,
>> 
>> I agree a big part of the problem with Dyn Reg is it has to reflect the 
>> current state of 6749 (specifically that clients must have a client_id even 
>> though 6749 says nothing about its format or how to obtain one).
>> 
>> Regarding timing (the need to approve dyn reg now): a draft doesn't have to 
>> be final for people to implement it into operational production.  In fact, 
>> putting into production is a far better validation than mere implementation. 
>> The fact that 6749 changed substantially in draft stage did not prevent many 
>> from putting it into production.  Why is approval a barrier in this case?  
>> My understanding is the IESG has the option force the draft to wait for 
>> operational use before it mores forward (see below).
>> 
>> I'm not sure an OAuth 3 is required here since 6749 is not yet final, rather 
>> it is "PROPOSED STANDARD".  In particular, section 4.1.1 of RFC2026 states:
>> 
>>>  A Proposed Standard specification is generally stable, has resolved  
>>> known design choices, is believed to be well-understood, has 
>>> received  significant community review, and appears to enjoy enough 
>>> community  interest to be considered valuable.  However, further 
>>> experience  might result in a change or even retraction of the 
>>> specification  before it advances.
>> 
>>>  Usually, neither implementation nor operational experience is  
>>> required for the designation of a specification as a Proposed  
>>> Standard.  However, such experience is highly desirable, and will  
>>> usually represent a strong argument in favor of a Proposed Standard  
>>> designation.
>> 
>>> 
>>>  The IESG may require implementation and/or operational experience  
>>> prior to granting Proposed Standard status to a specification that  
>>> materially affects the core Internet protocols or that specifies  
>>> behavior that may have significant operational impact on the  
>>> Internet.
>> 
>> 
>> This would suggest to me, that some of OAuth issues that drove the design of 
>> Dyn-Reg can be more cleanly resolved by amending 6749. Such a change would 
>> be permissive, backward compatible, and greatly simplify registration if not 
>> eliminate it in many cases.
>> 
>> The subject of improper use of OAuth as an authenticator is also an issue 
>> that should be discussed when it comes to moving the proposed standard 
>> (OAuth 2) forward.
>> 
>> Phil
>> 
>> @independentid
>> www.independentid.com
>> phil.h...@oracle.com
>> 
>> 
>> 
>> 
>> 
>> 
>> 
>> On 2013-08-15, at 12:59 PM, John Bradley <ve7...@ve7jtb.com> wrote:
>> 
>>> Yes a bearer token that is signed and or encrypted by the AS reduces the 
>>> amount of state required for the AS to maintain. 
>>> 
>>> In RFC 6749 there is information about the client that is tied to 
>>> the client_id, and is required at the authorization endpoint. (eg 
>>> redirect_uri)
>>> 
>>> I understand the goal of reducing state in the IdP.   Some of us have 
>>> looked at storing information in a signed client_id that would work in the 
>>> existing RFC 6749 flows.
>>> 
>>> It seems that some people are dissatisfied with RFC 6749 and would like to 
>>> see changes like removing implicit flows.
>>> 
>>> The current Dynamic registration spec deals with the current state of 
>>> OAuth.   If the WG decides to do a OAuth 3 that fully supports assertions 
>>> and ditches secrets I would be OK with that. 
>>> However lets not cripple what we have as a standard now by crating dynamic 
>>> registration that can only be fully implemented  in a future version of 
>>> OAuth.
>>> 
>>> Some people want/need a client registration API now.  It is clearly a 
>>> missing part of an entire OAuth system.   
>>> Supporting existing OAuth while minimizing state at the AS is something I 
>>> support, waiting for a OAuth redesign is not in my opinion a reasonable 
>>> medium term goal.
>>> 
>>> John B.
>>> 
>>> 
>>> On 2013-08-14, at 11:47 PM, Phil Hunt <phil.h...@oracle.com> wrote:
>>> 
>>>> I am saying a bearer token is better than a password for the service 
>>>> provider as Hannes explains. 
>>>> 
>>>> Phil
>>>> 
>>>> On 2013-08-14, at 19:42, Nat Sakimura <sakim...@gmail.com> wrote:
>>>> 
>>>>> Right. A Bearer Token does not have to be a shared secret. It may have 
>>>>> some structure that allows the server to validate it statelessly, e.g. 
>>>>> JWS-JWT. 
>>>>> 
>>>>> =nat via iPhone
>>>>> 
>>>>> Aug 14, 2013 15:32、Hannes Tschofenig <hannes.tschofe...@gmx.net> のメッセージ:
>>>>> 
>>>>>> George is correct with his statements. There is, however, a difference 
>>>>>> between a shared secret and an assertion as Phil pointed out. For the 
>>>>>> assertion the server does not need to maintain state on a per-client 
>>>>>> basis. On the other hand since the client secret isn't really used in 
>>>>>> the classical sense of a password either but rather as a "cookie" (if 
>>>>>> used in the style of Section 2.3.1 of RFC6749) one could easy apply the 
>>>>>> concept of stateless tokens to them:
>>>>>> http://tools.ietf.org/html/draft-rescorla-stateless-tokens-01
>>>>>> 
>>>>>> 
>>>>>> On 08/13/2013 07:21 PM, George Fletcher wrote:
>>>>>>> Hi Phil,
>>>>>>> 
>>>>>>> I'm sorry for not following completely. Some questions inline...
>>>>>>> 
>>>>>>> On 8/13/13 11:00 AM, Phil Hunt wrote:
>>>>>>>> Dyn reg and the scim reg variant depend too much/biased towards 
>>>>>>>> passwords expressed as client secrets.
>>>>>>> I'm not sure what you mean in regards to "client secrets". There 
>>>>>>> are
>>>>>>> OAuth2 bearer tokens that need to be protected because they are 
>>>>>>> bearer tokens. That said, there is nothing in the spec that 
>>>>>>> requires these to be opaque blobs vs signed tokens. So both the 
>>>>>>> "Initial Access Token" and the "Registration Access Token" can 
>>>>>>> be signed tokens. However, the client still has to protect them 
>>>>>>> as if they were a "secret" because they are a bearer token and 
>>>>>>> can be replayed. So it's the same amount of work on the client either 
>>>>>>> way.
>>>>>>> 
>>>>>>>> 
>>>>>>>> A signed token approach has many advantages for service 
>>>>>>>> providers like not having to maintain a secure database of 
>>>>>>>> secrets/passwords.
>>>>>>> If the concern here is the amount of data the Authorization 
>>>>>>> Server has to store to manage these clients, then the current 
>>>>>>> spec doesn't preclude using a "signed token". Both OAuth2 bearer 
>>>>>>> tokens identified in the current spec can be signed tokens.
>>>>>>>> 
>>>>>>>> Finally issuing both a client secret and registration token is 
>>>>>>>> costly and confusing to client developers.  I relented somewhat 
>>>>>>>> when I realized kerberos does this--but i still feel it is a 
>>>>>>>> bad design at cloud scale.
>>>>>>> Given that client_secrets are OPTIONAL in OAuth2 for some use 
>>>>>>> cases, I'm not sure how you abstract the client developer from 
>>>>>>> having to deal with them. The client developer is going to be 
>>>>>>> dealing with multiple OAuth2 tokens to multiple endpoints 
>>>>>>> regardless so I don't see another token as costly or complex. At 
>>>>>>> a minimum there is the refresh_token and access_token. Where is the 
>>>>>>> added client developer complexity?
>>>>>>> 
>>>>>>> Thanks,
>>>>>>> George
>>>>>>> 
>>>>>>>> 
>>>>>>>> Phil
>>>>>>>> 
>>>>>>>> On 2013-08-13, at 7:48, Justin Richer <jric...@mitre.org 
>>>>>>>> <mailto:jric...@mitre.org>> wrote:
>>>>>>>> 
>>>>>>>>> The spec doesn't care where you deploy at -- if URL space is 
>>>>>>>>> at a premium for you, then switch based on input parameters 
>>>>>>>>> and other things. And you're still not clear on which 
>>>>>>>>> "secrets" you're taking issue with.
>>>>>>>>> 
>>>>>>>>> -- Justin
>>>>>>>>> 
>>>>>>>>> On 08/13/2013 10:46 AM, Anthony Nadalin wrote:
>>>>>>>>>> 
>>>>>>>>>> #1, its yet another endpoint to have to manage secrets at, 
>>>>>>>>>> yes this is an OAuth item but it’s growing out of control, we 
>>>>>>>>>> are trying to move away from secrets and management of these 
>>>>>>>>>> endpoints as this would be just another one we have to 
>>>>>>>>>> support, monitor and report on
>>>>>>>>>> 
>>>>>>>>>> #2 yes, 1 physical endpoint acting as multiple authorization 
>>>>>>>>>> servers
>>>>>>>>>> 
>>>>>>>>>> *From:*George Fletcher [mailto:gffle...@aol.com]
>>>>>>>>>> *Sent:* Tuesday, August 13, 2013 7:40 AM
>>>>>>>>>> *To:* Anthony Nadalin
>>>>>>>>>> *Cc:* m...@gluu.org; Justin Richer; oauth@ietf.org
>>>>>>>>>> *Subject:* Re: [OAUTH-WG] OX needs Dynamic Registration: 
>>>>>>>>>> please don't remove!
>>>>>>>>>> 
>>>>>>>>>> Hi Tony,
>>>>>>>>>> 
>>>>>>>>>> Could you please explain a little more?
>>>>>>>>>> 
>>>>>>>>>> For issue 1:
>>>>>>>>>> * Which "secret" are you referring to? OAuth2 by default 
>>>>>>>>>> allows for an optional client_secret. I'm not sure why this 
>>>>>>>>>> would cause management issues? Or are you referring to the 
>>>>>>>>>> "Registration Access Token"?
>>>>>>>>>> * Why is a separate endpoint an issue? Any client is going to 
>>>>>>>>>> be talking to more than just the /authorize and /token 
>>>>>>>>>> endpoints anyway so I'm confused regarding the extra complexity?
>>>>>>>>>> 
>>>>>>>>>> For issue 2:
>>>>>>>>>> * What specifically do you mean by "multi-tenant"? Is this 
>>>>>>>>>> one server acting on behalf of multiple tenants and so 
>>>>>>>>>> appearing as multiple Authorization Servers?
>>>>>>>>>> 
>>>>>>>>>> Thanks,
>>>>>>>>>> George
>>>>>>>>>> 
>>>>>>>>>> [snip...]
>>>>>>>> 
>>>>>>>> 
>>>>>>>> _______________________________________________
>>>>>>>> OAuth mailing list
>>>>>>>> OAuth@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>>> 
>>>>>>> --
>>>>>>> 
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> OAuth mailing list
>>>>>>> OAuth@ietf.org
>>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>> 
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


Eve Maler                                  http://www.xmlgrrl.com/blog
+1 425 345 6756                         http://www.twitter.com/xmlgrrl

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to