+1. Saving a few bytes in exchange to interoperability and security possible downgrade does not seem to be a good strategy for me.
Nat 2014-03-12 7:04 GMT+09:00 Phil Hunt <phil.h...@oracle.com>: > I think that's the wrong perspective. If you intend the issuer to be the > subject, you need to declare it. > > I wouldn't worry that it duplicates issuer. The fields have different > meaning. > > Phil > > @independentid > www.independentid.com > phil.h...@oracle.com > > On 2014-03-11, at 1:43 PM, Antonio Sanso <asa...@adobe.com> wrote: > > > agree, but in some cases the subject is not only same as the issuer but > simply it doesn't matter. > > > > In my example below all it matters is that the assertion signed by app1 > is valid.... > > > > Continue in my probably not relevant "Google example" if I set the prn > same as the issuer it would not work (keeping only the issuer without any > subject gives me back a correct access token instead). > > > > Again this is not relevant spec wise. AFIU there is consensus in the > working group to keep the subject mandatory. Would it make sense at least > to add a little not that in some situations the issuer and the subject are > the same? > > This might clarify at least something to people that do wonder... > > > > regards > > > > antonio > > > > On Mar 11, 2014, at 8:12 PM, John Bradley <ve7...@ve7jtb.com> wrote: > > > >> The specification is intended to allow the interoperation of standard > libraries. > >> > >> In some cases the subject and the iss may be the same, however the > underlying OAuth library may be a general one and always require a subject > for security processing. > >> > >> It is possible that all libraries could have a special rule for when > sub is not present and use the value of iss as sub. This will save some > bytes in the JWT but it is probably not worth creating an extra code path > in libraries for the size optimization. > >> > >> I don't think your saying there is no subject just that it is redundant > with iss in some cases. > >> > >> John B. > >> > >> On Mar 11, 2014, at 2:11 PM, Antonio Sanso <asa...@adobe.com> wrote: > >> > >>> Ok this is my use case: > >>> > >>> - I am John Doe and going to AS to register my app named app1 > >>> - I then either upload my public key or download a private key > >>> - at this point I am ready to build my assertion, the issuer claim is > going to be app1 and should suffice. > >>> > >>> is the subject really needed in this use case? > >>> > >>> regards > >>> > >>> antonio > >>> > >>> > >>> On Mar 11, 2014, at 4:25 PM, John Bradley <ve7...@ve7jtb.com> wrote: > >>> > >>>> The missing scheme especially on JWT issued by google is something I > understand they are working on but need to be careful about breaking > existing code, so will possibly need new endpoints that are spec compliant. > >>>> > >>>> While in this google case the subject and the issuer happen to be the > same they may well not be even in the self signed case. In WG discussions > being consistent in providing the subject was considered to be better for > interoperability than optimizing for the case where sub or issuer could be > dropped. > >>>> > >>>> John B. > >>>> > >>>> On Mar 11, 2014, at 12:05 PM, Hannes Tschofenig < > hannes.tschofe...@gmx.net> wrote: > >>>> > >>>>> Maintaining both information in the JWT is IMHO valuable since it > gives > >>>>> you some information about the security properties. Needless to say > that > >>>>> there is a substantial difference between a self-created JWT and a > JWT > >>>>> from a third party the relying party has some confidence in. > >>>>> > >>>>> Why Google has an old implementation and whether they are planning to > >>>>> update their code remains to be seen. > >>>>> > >>>>> More importantly, however, is why you argue that the subject claim > has > >>>>> to be optional. > >>>>> > >>>>> Ciao > >>>>> Hannes > >>>>> > >>>>> Ps: I also noticed in the examples that all URIs have their URI > scheme > >>>>> missing. While that might be OK I am not entirely sure... > >>>>> > >>>>> On 03/11/2014 04:08 PM, Antonio Sanso wrote: > >>>>>> > >>>>>> On Mar 11, 2014, at 3:53 PM, Hannes Tschofenig < > hannes.tschofe...@gmx.net> wrote: > >>>>>> > >>>>>>> Thanks for clarifying. > >>>>>>> > >>>>>>> I took a quick look at the Google API and it seems that in their > use > >>>>>>> case the client creates the JWT and consequently the subject and > the > >>>>>>> issue would actually be the same. I suspect that this is the > reason why > >>>>>>> they omitted the subject. > >>>>>> > >>>>>> agreed that is why in my mail I said the subject might overlap with > the issuer. > >>>>>> The subject in the google case is still called with its obsolete > name (prn) and it is actually listed as 'additional claims' hence not > mandatory. > >>>>>> > >>>>>> regards > >>>>>> > >>>>>> antonio > >>>>>> > >>>>>>> > >>>>>>> Could you explain why you would like to omit the subject claim in > the JWT? > >>>>>>> > >>>>>>> Ciao > >>>>>>> Hannes > >>>>>>> > >>>>>>> PS: Your feedback on the draft-ietf-oauth-jwt-bearer-07 spec is > timely > >>>>>>> since we are about to finish all three assertion specs. > >>>>>>> > >>>>>>> > >>>>>>> On 03/11/2014 03:56 PM, Antonio Sanso wrote: > >>>>>>>> hi Hannes, > >>>>>>>> > >>>>>>>> I am aware of the 2 documents, > >>>>>>>> > >>>>>>>> I might be wrong but > http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07 is also about > Authorization Grant Processing (this is the part I do use in my > implementation ) and not only Client Authentication Processing. > >>>>>>>> > >>>>>>>> Just my 0.02 $ but this seems to be a place where different > implementer have the same issue :) > >>>>>>>> > >>>>>>>> regards > >>>>>>>> > >>>>>>>> antonio > >>>>>>>> > >>>>>>>> On Mar 11, 2014, at 3:36 PM, Hannes Tschofenig < > hannes.tschofe...@gmx.net> wrote: > >>>>>>>> > >>>>>>>>> Hi Manfred, Hi Antonio, > >>>>>>>>> > >>>>>>>>> Note that there are two documents that talk about the JWT and > you guys > >>>>>>>>> might be looking at the wrong document. > >>>>>>>>> > >>>>>>>>> The main JWT document (see > >>>>>>>>> http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-18) > defines > >>>>>>>>> the subject claim as optional (see Section 4.1.2). > >>>>>>>>> > >>>>>>>>> The JWT bearer assertion document (see > >>>>>>>>> http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07) does > indeed > >>>>>>>>> define it as mandatory but that's intentional since the purpose > of the > >>>>>>>>> spec is to authenticate the client (or the resource owner for an > >>>>>>>>> authorization grant). > >>>>>>>>> > >>>>>>>>> The assertion documents are used for interworking with "legacy" > identity > >>>>>>>>> infrastructure (such as SAML federations). > >>>>>>>>> > >>>>>>>>> So, are you sure you are indeed looking at the right document? > >>>>>>>>> > >>>>>>>>> Ciao > >>>>>>>>> Hannes > >>>>>>>>> > >>>>>>>>> > >>>>>>>>> On 03/11/2014 03:13 PM, Antonio Sanso wrote: > >>>>>>>>>> hi *, > >>>>>>>>>> > >>>>>>>>>> JSON Web Token (JWT) Profile section 3 [0] explicitely says > >>>>>>>>>> > >>>>>>>>>> The JWT MUST contain a "sub" (subject) claim > >>>>>>>>>> > >>>>>>>>>> > >>>>>>>>>> Now IMHO there are cases where having the sub is either not > needed or > >>>>>>>>>> redundant (since it might overlap with the issuer).\ > >>>>>>>>>> > >>>>>>>>>> As far as I can see "even Google" currently violates this spec > [1] ( I > >>>>>>>>>> know that this doesn't matter, just wanted to bring a real use > case > >>>>>>>>>> scenario). > >>>>>>>>>> > >>>>>>>>>> WDYT might the "sub" be optional in some situation? > >>>>>>>>>> > >>>>>>>>>> regards > >>>>>>>>>> > >>>>>>>>>> antonio > >>>>>>>>>> > >>>>>>>>>> [0] > http://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-07#section-3 > >>>>>>>>>> [1] > https://developers.google.com/accounts/docs/OAuth2ServiceAccount > >>>>>>>>>> > >>>>>>>>>> > >>>>>>>>>> _______________________________________________ > >>>>>>>>>> OAuth mailing list > >>>>>>>>>> OAuth@ietf.org > >>>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth > >>>>>>>>>> > >>>>>>>>> > >>>>>>>> > >>>>>>> > >>>>>> > >>>>> > >>>>> _______________________________________________ > >>>>> OAuth mailing list > >>>>> OAuth@ietf.org > >>>>> https://www.ietf.org/mailman/listinfo/oauth > >>>> > >>> > >> > > > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org > > https://www.ietf.org/mailman/listinfo/oauth > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > -- Nat Sakimura (=nat) Chairman, OpenID Foundation http://nat.sakimura.org/ @_nat_en
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth