Yeah I think that's fair (though regrettable:-). Will look at it before the meeting.
S On 12/11/14 00:03, Mike Jones wrote: > Hi Stephen, > > Your DISCUSS on "alg":"none" being MTI is the only one remaining on the JWT > draft. Given the working group support for keeping things the way they are, > would you be willing to clear this DISCUSS on that basis? The OAuth WG > meeting is tomorrow, so it would be good to hear your thoughts before then, > if possible. > > Thanks, > -- Mike > > -----Original Message----- > From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Mike Jones > Sent: Friday, October 24, 2014 8:33 PM > To: 'Stephen Farrell'; The IESG > Cc: oauth-cha...@tools.ietf.org; > draft-ietf-oauth-json-web-to...@tools.ietf.org; oauth@ietf.org > Subject: Re: [OAUTH-WG] Stephen Farrell's Discuss on > draft-ietf-oauth-json-web-token-27: (with DISCUSS and COMMENT) > > Hi Stephen, > > I applied your privacy wording to the -30 draft. Thanks. > > About your DISCUSS on "alg":"none" being MTI, several working group members > have chimed in agreeing that it should continue to be MTI, and said why. In > summary - unsigned security tokens representing claims are really common in > identity protocols; interop will be improved if this functionality is MTI. > Can I therefore ask you hold your nose a little bit more and clear this > remaining DISCUSS? > > Thanks again, > -- Mike > > -----Original Message----- > From: Stephen Farrell [mailto:stephen.farr...@cs.tcd.ie] > Sent: Tuesday, October 21, 2014 6:17 AM > To: Mike Jones; The IESG > Cc: oauth-cha...@tools.ietf.org; > draft-ietf-oauth-json-web-to...@tools.ietf.org; oauth@ietf.org > Subject: Re: Stephen Farrell's Discuss on draft-ietf-oauth-json-web-token-27: > (with DISCUSS and COMMENT) > > > Hi Mike, > > I've one remaining discuss point and a comment. See below... > > On 14/10/14 13:50, Mike Jones wrote: >> The proposed resolutions below have been included in the -28 draft. >> Hopefully you'll be able to clear your DISCUSSes on that basis. >> >> The String Comparison Rules in Section 7.3 have been expanded to talk about >> when the application may need canonicalization rules. >> >> Thanks again, >> -- Mike >> >>> -----Original Message----- >>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Mike Jones >>> Sent: Monday, October 06, 2014 7:20 PM >>> To: Stephen Farrell; The IESG >>> Cc: oauth-cha...@tools.ietf.org; draft-ietf-oauth-json-web- >>> to...@tools.ietf.org; oauth@ietf.org >>> Subject: Re: [OAUTH-WG] Stephen Farrell's Discuss on >>> draft-ietf-oauth-json- >>> web-token-27: (with DISCUSS and COMMENT) >>> >>> Thanks for tracking all of this Stephen. Responses inline below... >>> >>>> -----Original Message----- >>>> From: Stephen Farrell [mailto:stephen.farr...@cs.tcd.ie] >>>> Sent: Monday, October 06, 2014 2:43 PM >>>> To: Mike Jones; The IESG >>>> Cc: oauth-cha...@tools.ietf.org; draft-ietf-oauth-json-web- >>>> to...@tools.ietf.org; oauth@ietf.org >>>> Subject: Re: Stephen Farrell's Discuss on >>>> draft-ietf-oauth-json-web-token-27: >>>> (with DISCUSS and COMMENT) >>>> >>>> >>>> Hi Mike, >>>> >>>> On 06/10/14 08:54, Mike Jones wrote: >>>>> Thanks for your review, Stephen. I've added the working group to >>>>> the thread so they're aware of your comments. >>>>> >>>>>> -----Original Message----- From: Stephen Farrell >>>>>> [mailto:stephen.farr...@cs.tcd.ie] Sent: Thursday, October 02, >>>>>> 2014 >>>>>> 5:03 AM To: The IESG Cc: oauth-cha...@tools.ietf.org; >>>>>> draft-ietf-oauth-json-web- to...@tools.ietf.org Subject: Stephen >>>>>> Farrell's Discuss on draft-ietf-oauth-json-web-token-27: (with >>>>>> DISCUSS and COMMENT) >>>>>> >>>>>> Stephen Farrell has entered the following ballot position for >>>>>> draft-ietf-oauth-json-web-token-27: Discuss >>>>>> >>>>>> When responding, please keep the subject line intact and reply to >>>>>> all email addresses included in the To and CC lines. (Feel free to >>>>>> cut this introductory paragraph, however.) >>>>>> >>>>>> >>>>>> Please refer to >>>>>> http://www.ietf.org/iesg/statement/discuss-criteria.html for more >>>>>> information about IESG DISCUSS and COMMENT positions. >>>>>> >>>>>> >>>>>> The document, along with other ballot positions, can be found >>>>>> here: >>>>>> http://datatracker.ietf.org/doc/draft-ietf-oauth-json-web-token/ >>>>>> >>>>>> >>>>>> >>>>>> ------------------------------------------------------------------ >>>>>> - >>>>>> -- >>>>>> - >>>>>> >>>>>> >>>> DISCUSS: >>>>>> ------------------------------------------------------------------ >>>>>> - >>>>>> -- >>>>>> - >>>>>> >>>>>> >>>>>> >>>>>> >>>> (1) 4.1.1 and elsewhere you say case-sensitive: the same thing I >>>> raised wrt DNS >>>>>> names for another JOSE spec - do you need to say those SHOULD be >>>>>> [upper|lower]cased when used in these? >>>>> >>>>> I believe that somewhere we should say that if case-insensitive >>>>> values, such as DNS names, are used when constructing "kid" values, >>>>> that the application doing so needs to define a convention on the >>>>> canonical case to use for the case-insensitive portions, such as >>>>> lowercasing them. >>>> >>>> As that discussion's happening on the key draft, I'll clear it here >>>> and trust you to fix if a change is the end result. >>> >>> Thanks > > np > >>> >>>>>> (2) Section 8: Why is "none" MTI? That seems both broken and going >>>>>> in the oppostite direction from other WGs and so should be >>>>>> explicitly jusified I think. (If a good enough justification >>>>>> exists that is.) >>>>> >>>>> It is MTI because there are several existing applications of JWTs >>>>> in which both unsigned and signed representations of the JWTs are >>>>> requirements. These include draft-ietf-oauth-token-exchange, >>>>> draft-hunt-oauth-v2-user-a4c, and OpenID Connect. This is a pretty >>>>> common pattern where you sign something if the recipient cares who >>>>> made the statements and where you don't have to sign it either if >>>>> the recipient doesn't care who made the statements >>>> >>>> I don't see how (non-)signers can divine non-verifier's wishes that >>>> way. (Absent negotiation or a directory.) >>> >>> Sometimes it does occur via negotiation. For instance, in some >>> protocols, at registration time, relying parties explicitly tell >>> identity providers what algorithms are acceptable to them, which may >>> include "none". No divination - explicit communication. >>> >>>>> or if it can tell from >>>>> another secured aspect of the application protocol (typically >>>>> through the use of TLS) who made the statements. In the TLS case, >>>>> the server authentication step makes a signature step unnecessary, >>>>> so an Unsecured JWT is fine there. >>>> >>>> That's arguable IMO. >>> >>> I agree that it's application and context-dependent whether it's OK >>> or not. The point is that there exist some circumstances in which it >>> is OK, and this feature is being used in some of those cases. >>> >>>> I think I'll look back over the wg thread and either hold my nose or >>> >>> This issue was tracked as http://trac.tools.ietf.org/wg/jose/trac/ticket/36. >>> Karen O'Donoghue recorded this conclusion in the tracker "Note: There >>> was extensive discussion on the mailing list, and the rough >>> consensus of the working group was to leave "none" in the document." >>> >>> Discussion threads on this topic include: >>> [jose] #36: Algorithm "none" should be removed >>> http://www.ietf.org/mail- archive/web/jose/current/msg02911.html - >>> Began Jul 31, 2013 (91 messages) [jose] Text about applications and >>> "alg":"none" http://www.ietf.org/mail- >>> archive/web/jose/current/msg03321.html - Began Sep 3, 2013 (5 >>> messages) >>> >>> This issue was a topic of a special working group call on Aug 19, >>> 2013. The text discussed in the last thread and published at >>> https://tools.ietf.org/html/draft- >>> ietf-jose-json-web-algorithms-33#section-8.5 (Unsecured JWS Security >>> Considerations) was the result of the working group's decisions >>> resulting from all of this discussion. > > Thanks for all the pointers above. I read through all the (many!) Aug 19 > mails and most of the `"none" should be removed" thread. > > So I do see that there was rough consensus to keep "none" in the draft and > can (with difficulty;-) hold my nose and let that pass. I do not however, see > that there was consensus to make "none" MTI for this draft. I did see a bit > of haggling about this draft vs. JWS but still do not see why none ought be > MTI here. > >>> >>>>>> (3) Section 12: another way to handle privacy is to not include >>>>>> sensitive data - I think you ought mention that as a bit of >>>>>> thought along those lines can be much simpler than putting in >>>>>> place the key management to handle thoughtlessly included PII. >>>>> >>>>> We can include a discussion of that point, >>>> >>>> Great. "Just say no" is workable here:-) I'll clear when we get such text. >>>> >>>>> but sometimes the very >>>>> point of a JWT is to securely deliver PII from a verifiable party >>>>> to an intended party with appropriate rights to receive it. >>>> >>>> Hmm. Its a moot point (so let's not argue it) but I wonder how often >>>> PII is really needed for authorization with oauth. My guess would be >>>> that its needed far less often than its found to be profitable >>>> perhaps, or that carelessness plays a big role in using PII for such >>>> purposes. > > I've cleared on this as you added this text: > > "Of course, including > only necessary privacy-sensitive information in a JWT is the most > basic means of minimizing any potential privacy issues." > > That seems to me like a fairly offputting way to phrase it. I'd suggest > instead: > > "Omitting privacy-sensitive information from a JWT is the > simplest way of minimizing privacy issues." > > Cheers, > S. > > PS: I didn't check the comments. > >>>> >>>> S. >>>> >>>> >>>> >>>>> >>>>>> ------------------------------------------------------------------ >>>>>> - >>>>>> -- >>>>>> - >>>>>> >>>>>> >>>> COMMENT: >>>>>> ------------------------------------------------------------------ >>>>>> - >>>>>> -- >>>>>> - >>>>>> >>>>>> >>>>>> >>>>>> >>>> - abstract: 2nd sentence isn't needed here, in intro would be fine. >>>>> >>>>> I don't know - I think it's a big deal that the claims can be >>>>> digitally signed or MACed and/or encrypted. That's the reason we >>>>> have JWTs, rather than just JSON. >>>>> >>>>>> - 4.1.7: maybe worth adding that jti+iss being unique enough is >>>>>> not sufficient and jti alone has to meet that need. In X.509 the >>>>>> issuer/serial has the equivalent property so someone might assume >>>>>> sequential jti values starting at 0 are ok. >>>>> >>>>> Makes sense to add a warning of some kind along these lines. I >>>>> think I know the reasons you say that, but can you expand on that >>>>> thought a bit before I take a stab on writing this up? For >>>>> instance, while normally true, I don't think your observation is >>>>> true if a relying party will only accept tokens from a single issuer. >>>>> >>>>>> - section 6: yuk >>>>>> >>>>>> - again I think the secdir comments are being handled by Kathleen >>>>>> and the authors. >>>>> >>>>> Again, this is there because multiple applications asked for the >>>>> ability to represent content that is optionally signed, sometimes >>>>> securing it another way, such as with TLS. JWTs are used specific >>>>> application protocol contexts - not in isolation. >>>>> >>>>> Thanks again, -- Mike >>>>> >>> _______________________________________________ >>> OAuth mailing list >>> OAuth@ietf.org >>> https://www.ietf.org/mailman/listinfo/oauth >> > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > _______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth