On Tue, Oct 21, 2014 at 9:16 AM, Stephen Farrell <stephen.farr...@cs.tcd.ie>
wrote:

>
> Hi Mike,
>
> I've one remaining discuss point and a comment. See below...
>
> On 14/10/14 13:50, Mike Jones wrote:
> > The proposed resolutions below have been included in the -28 draft.
> Hopefully you'll be able to clear your DISCUSSes on that basis.
> >
> > The String Comparison Rules in Section 7.3 have been expanded to talk
> about when the application may need canonicalization rules.
> >
> >                               Thanks again,
> >                               -- Mike
> >
> >> -----Original Message-----
> >> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Mike Jones
> >> Sent: Monday, October 06, 2014 7:20 PM
> >> To: Stephen Farrell; The IESG
> >> Cc: oauth-cha...@tools.ietf.org; draft-ietf-oauth-json-web-
> >> to...@tools.ietf.org; oauth@ietf.org
> >> Subject: Re: [OAUTH-WG] Stephen Farrell's Discuss on
> draft-ietf-oauth-json-
> >> web-token-27: (with DISCUSS and COMMENT)
> >>
> >> Thanks for tracking all of this Stephen.  Responses inline below...
> >>
> >>> -----Original Message-----
> >>> From: Stephen Farrell [mailto:stephen.farr...@cs.tcd.ie]
> >>> Sent: Monday, October 06, 2014 2:43 PM
> >>> To: Mike Jones; The IESG
> >>> Cc: oauth-cha...@tools.ietf.org; draft-ietf-oauth-json-web-
> >>> to...@tools.ietf.org; oauth@ietf.org
> >>> Subject: Re: Stephen Farrell's Discuss on
> draft-ietf-oauth-json-web-token-27:
> >>> (with DISCUSS and COMMENT)
> >>>
> >>>
> >>> Hi Mike,
> >>>
> >>> On 06/10/14 08:54, Mike Jones wrote:
> >>>> Thanks for your review, Stephen.  I've added the working group to
> >>>> the thread so they're aware of your comments.
> >>>>
> >>>>> -----Original Message----- From: Stephen Farrell
> >>>>> [mailto:stephen.farr...@cs.tcd.ie] Sent: Thursday, October 02, 2014
> >>>>> 5:03 AM To: The IESG Cc: oauth-cha...@tools.ietf.org;
> >>>>> draft-ietf-oauth-json-web- to...@tools.ietf.org Subject: Stephen
> >>>>> Farrell's Discuss on draft-ietf-oauth-json-web-token-27: (with
> >>>>> DISCUSS and COMMENT)
> >>>>>
> >>>>> Stephen Farrell has entered the following ballot position for
> >>>>> draft-ietf-oauth-json-web-token-27: Discuss
> >>>>>
> >>>>> When responding, please keep the subject line intact and reply to
> >>>>> all email addresses included in the To and CC lines. (Feel free to
> >>>>> cut this introductory paragraph, however.)
> >>>>>
> >>>>>
> >>>>> Please refer to
> >>>>> http://www.ietf.org/iesg/statement/discuss-criteria.html for more
> >>>>> information about IESG DISCUSS and COMMENT positions.
> >>>>>
> >>>>>
> >>>>> The document, along with other ballot positions, can be found
> >>>>> here:
> >>>>> http://datatracker.ietf.org/doc/draft-ietf-oauth-json-web-token/
> >>>>>
> >>>>>
> >>>>>
> >>>>> -------------------------------------------------------------------
> >>>>> --
> >>>>> -
> >>>>>
> >>>>>
> >>> DISCUSS:
> >>>>> -------------------------------------------------------------------
> >>>>> --
> >>>>> -
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>> (1) 4.1.1 and elsewhere you say case-sensitive: the same thing I
> >>> raised wrt DNS
> >>>>> names for another JOSE spec - do you need to say those SHOULD be
> >>>>> [upper|lower]cased when used in these?
> >>>>
> >>>> I believe that somewhere we should say that if case-insensitive
> >>>> values, such as DNS names, are used when constructing "kid" values,
> >>>> that the application doing so needs to define a convention on the
> >>>> canonical case to use for the case-insensitive portions, such as
> >>>> lowercasing them.
> >>>
> >>> As that discussion's happening on the key draft, I'll clear it here
> >>> and trust you to fix if a change is the end result.
> >>
> >> Thanks
>
> np
>
> >>
> >>>>> (2) Section 8: Why is "none" MTI? That seems both broken and going
> >>>>> in the oppostite direction from other WGs and so should be
> >>>>> explicitly jusified I think. (If a good enough justification exists
> >>>>> that is.)
> >>>>
> >>>> It is MTI because there are several existing applications of JWTs in
> >>>> which both unsigned and signed representations of the JWTs are
> >>>> requirements.  These include draft-ietf-oauth-token-exchange,
> >>>> draft-hunt-oauth-v2-user-a4c, and OpenID Connect.  This is a pretty
> >>>> common pattern where you sign something if the recipient cares who
> >>>> made the statements and where you don't have to sign it either if
> >>>> the recipient doesn't care who made the statements
> >>>
> >>> I don't see how (non-)signers can divine non-verifier's wishes that
> >>> way. (Absent negotiation or a directory.)
> >>
> >> Sometimes it does occur via negotiation.  For instance, in some
> protocols, at
> >> registration time, relying parties explicitly tell identity providers
> what algorithms
> >> are acceptable to them, which may include "none".  No divination -
> explicit
> >> communication.
> >>
> >>>> or if it can tell from
> >>>> another secured aspect of the application protocol (typically
> >>>> through the use of TLS) who made the statements.  In the TLS case,
> >>>> the server authentication step makes a signature step unnecessary,
> >>>> so an Unsecured JWT is fine there.
> >>>
> >>> That's arguable IMO.
> >>
> >> I agree that it's application and context-dependent whether it's OK or
> not.  The
> >> point is that there exist some circumstances in which it is OK, and
> this feature is
> >> being used in some of those cases.
> >>
> >>> I think I'll look back over the wg thread and either hold my nose or
> >>
> >> This issue was tracked as
> http://trac.tools.ietf.org/wg/jose/trac/ticket/36.
> >> Karen O'Donoghue recorded this conclusion in the tracker "Note: There
> was
> >> extensive discussion on the mailing list, and the rough  consensus of
> the working
> >> group was to leave "none" in the document."
> >>
> >> Discussion threads on this topic include:
> >> [jose] #36: Algorithm "none" should be removed
> http://www.ietf.org/mail-
> >> archive/web/jose/current/msg02911.html - Began Jul 31, 2013  (91
> messages)
> >> [jose] Text about applications and "alg":"none"
> http://www.ietf.org/mail-
> >> archive/web/jose/current/msg03321.html - Began Sep 3, 2013 (5 messages)
> >>
> >> This issue was a topic of a special working group call on Aug 19,
> 2013.  The text
> >> discussed in the last thread and published at
> https://tools.ietf.org/html/draft-
> >> ietf-jose-json-web-algorithms-33#section-8.5 (Unsecured JWS Security
> >> Considerations) was the result of the working group's decisions
> resulting from all
> >> of this discussion.
>
> Thanks for all the pointers above. I read through all the (many!)
> Aug 19 mails and most of the `"none" should be removed" thread.
>
> So I do see that there was rough consensus to keep "none" in
> the draft and can (with difficulty;-) hold my nose and let that
> pass. I do not however, see that there was consensus to make
> "none" MTI for this draft. I did see a bit of haggling about
> this draft vs. JWS but still do not see why none ought be MTI
> here.
>
> >>
> >>>>> (3) Section 12: another way to handle privacy is to not include
> >>>>> sensitive data - I think you ought mention that as a bit of thought
> >>>>> along those lines can be much simpler than putting in place the key
> >>>>> management to handle thoughtlessly included PII.
> >>>>
> >>>> We can include a discussion of that point,
> >>>
> >>> Great. "Just say no" is workable here:-) I'll clear when we get such
> text.
> >>>
> >>>> but sometimes the very
> >>>> point of a JWT is to securely deliver PII from a verifiable party to
> >>>> an intended party with appropriate rights to receive it.
> >>>
> >>> Hmm. Its a moot point (so let's not argue it) but I wonder how often
> >>> PII is really needed for authorization with oauth. My guess would be
> >>> that its needed far less often than its found to be profitable
> >>> perhaps, or that carelessness plays a big role in using PII for such
> purposes.
>
> I've cleared on this as you added this text:
>
>   "Of course, including
>    only necessary privacy-sensitive information in a JWT is the most
>    basic means of minimizing any potential privacy issues."
>
> That seems to me like a fairly offputting way to phrase it. I'd
> suggest instead:
>
>   "Omitting privacy-sensitive information from a JWT is the
>   simplest way of minimizing privacy issues."
>

I like this wording suggestion, thanks.


>
> Cheers,
> S.
>
> PS: I didn't check the comments.
>
> >>>
> >>> S.
> >>>
> >>>
> >>>
> >>>>
> >>>>> -------------------------------------------------------------------
> >>>>> --
> >>>>> -
> >>>>>
> >>>>>
> >>> COMMENT:
> >>>>> -------------------------------------------------------------------
> >>>>> --
> >>>>> -
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>> - abstract: 2nd sentence isn't needed here, in intro would be fine.
> >>>>
> >>>> I don't know - I think it's a big deal that the claims can be
> >>>> digitally signed or MACed and/or encrypted.  That's the reason we
> >>>> have JWTs, rather than just JSON.
> >>>>
> >>>>> - 4.1.7: maybe worth adding that jti+iss being unique enough is not
> >>>>> sufficient and jti alone has to meet that need. In X.509 the
> >>>>> issuer/serial has the equivalent property so someone might assume
> >>>>> sequential jti values starting at 0 are ok.
> >>>>
> >>>> Makes sense to add a warning of some kind along these lines.  I
> >>>> think I know the reasons you say that, but can you expand on that
> >>>> thought a bit before I take a stab on writing this up?  For
> >>>> instance, while normally true, I don't think your observation is
> >>>> true if a relying party will only accept tokens from a single issuer.
> >>>>
> >>>>> - section 6: yuk
> >>>>>
> >>>>> - again I think the secdir comments are being handled by Kathleen
> >>>>> and the authors.
> >>>>
> >>>> Again, this is there because multiple applications asked for the
> >>>> ability to represent content that is optionally signed, sometimes
> >>>> securing it another way, such as with TLS.  JWTs are used specific
> >>>> application protocol contexts - not in isolation.
> >>>>
> >>>> Thanks again, -- Mike
> >>>>
> >> _______________________________________________
> >> OAuth mailing list
> >> OAuth@ietf.org
> >> https://www.ietf.org/mailman/listinfo/oauth
> >
>
>


-- 

Best regards,
Kathleen
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to