Alissa, Could you take a look at your discuss and see if you agree it can be cleared? It looks like your suggestions were all incorporated into section 12. Privacy Considerations.
https://datatracker.ietf.org/doc/draft-ietf-oauth-json-web-token/ Thank you, Kathleen On Sat, Oct 25, 2014 at 2:33 AM, Mike Jones <michael.jo...@microsoft.com> wrote: > Hi Alissa, > > > > In addition to incorporating your proposed text earlier, I also just > included this sentence in the privacy considerations text of draft -30, > which was supplied by Stephen: > > “Omitting privacy-sensitive information from a JWT is the simplest way of > minimizing privacy issues”. > > > > Hopefully these resolutions will enable you to clear your DISCUSS. > > > > Thanks again, > > -- Mike > > > > From: Mike Jones [mailto:michael.jo...@microsoft.com] > Sent: Tuesday, October 14, 2014 5:45 AM > To: Alissa Cooper > Cc: Kathleen Moriarty; The IESG; oauth-cha...@tools.ietf.org; > draft-ietf-oauth-json-web-to...@tools.ietf.org; oauth@ietf.org > Subject: RE: Alissa Cooper's Discuss on draft-ietf-oauth-json-web-token-27: > (with DISCUSS) > > > > These resolutions have been incorporated in the -28 draft. Thanks again for > your review. > > > > -- Mike > > > > From: Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com] > Sent: Thursday, October 02, 2014 8:21 AM > To: Mike Jones > Cc: Alissa Cooper; The IESG; oauth-cha...@tools.ietf.org; > draft-ietf-oauth-json-web-to...@tools.ietf.org; oauth@ietf.org > Subject: Re: Alissa Cooper's Discuss on draft-ietf-oauth-json-web-token-27: > (with DISCUSS) > > > > > > > > On Thu, Oct 2, 2014 at 11:14 AM, Mike Jones <michael.jo...@microsoft.com> > wrote: > > Responding to the DISCUSS below… > > > > -----Original Message----- > From: Alissa Cooper [mailto:ali...@cooperw.in] > Sent: Wednesday, October 01, 2014 12:25 PM > To: The IESG > Cc: oauth-cha...@tools.ietf.org; > draft-ietf-oauth-json-web-to...@tools.ietf.org > Subject: Alissa Cooper's Discuss on draft-ietf-oauth-json-web-token-27: > (with DISCUSS) > > > > Alissa Cooper has entered the following ballot position for > > draft-ietf-oauth-json-web-token-27: Discuss > > > > When responding, please keep the subject line intact and reply to all email > addresses included in the To and CC lines. (Feel free to cut this > introductory paragraph, however.) > > > > > > Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html > > for more information about IESG DISCUSS and COMMENT positions. > > > > > > The document, along with other ballot positions, can be found here: > > http://datatracker.ietf.org/doc/draft-ietf-oauth-json-web-token/ > > > > > > > > ---------------------------------------------------------------------- > > DISCUSS: > > ---------------------------------------------------------------------- > > > > == Section 12 == > > > > "A JWT may contain privacy-sensitive information. When this is the > > case, measures must be taken to prevent disclosure of this > > information to unintended parties." > > > > It seems to me that this should be a normative MUST, particularly in light > of the fact that claims are being defined that are meant to directly > identify users (e.g., sub) and other claims defined here or later could do > so as well. > > > > There seems to be debate whether a 2119 language should be used other than > when describing protocol requirements. Jim Schaad (the JOSE chair) believes > that they shouldn’t and these documents have followed that convention. > > With other documents, there is RFC2119 language used for security & privacy > considerations. At some point there was a trend to have a separate > "Security Requirements" section from "Security Considerations", but I don't > think there was any requirement for this, just a preference. I agree that > this should be a MUST, but with Stephen as well that you should discourage > putting in privacy related information to begin with. > > > > "One way to achieve this is to use > > an encrypted JWT. Another way is to ensure that JWTs containing > > unencrypted privacy-sensitive information are only transmitted over > > encrypted channels or protocols, such as TLS." > > > > Since sensitive JWTs should be protected from both intermediary observation > and from being sent to unintended recipients, I would > > suggest: > > > > One way to achieve this is to use an encrypted JWT and authenticate the > recipient. Another way is to ensure that JWTs containing unencrypted > privacy-sensitive information are only transmitted over encrypted channels > or protocols that also support endpoint authentication, such as TLS. > > > > Thanks for this suggested language. We can incorporate something like that. > > OK, this makes sense and will feed into Pete's discuss on where TLS should > be required. > > > > Thanks! > > > > > > > > -- > > > > Best regards, > > Kathleen -- Best regards, Kathleen _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth