Ben, thanks for your review. Comments inline.

> On Jun 9, 2015, at 5:24 PM, Ben Campbell <b...@nostrum.com> wrote:
> 
> Ben Campbell has entered the following ballot position for
> draft-ietf-oauth-introspection-09: No Objection
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-oauth-introspection/
> 
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> I concur with Alissa's discuss.  
> 
> Additional comments:
> 
> -- There is no reference to RFC 2119, but there seems to be lots of
> capitalized 2119 keywords. If those are intended to have the 2119
> meaning, please add the usual reference. (I assume that these are
> intended as 2119 keywords for the remainder of the review.)
> 

This seems to be a bug in the xml2rfc template, I’ll fix that. 

> -- 2.1, first paragraph:
> 
> If the server MAY support GET, how does a client know to use it? Would
> you expect them to try and fail?

Was brought on by Barry Lieba, my suggested fix is to say server MUST support 
POST, and remain silent on other verbs. Will that suffice?

> 
> -- 3
> 
> Is there a reason not to use a more standard IANA procedure? (I.e. let
> people request registrations to IANA, and have them forward the requests
> to the DE?)
> 
> --3.1, under "Name"
> 
> The MUST seems unnecessary, as that's the whole point of a registry.

I pulled the IANA language from other specs, I’ll defer the proper wording and 
structure of this to other experts.

> 
> -- 4:
> The security considerations have a lot of restated 2119 keywords. If you
> want to reinforce those here, it would be better to do so with
> descriptive language, rather than having multiple occurrences of the same
> normative language.  Redundant normative language is error prone,
> especially for future updates.

Noted. We’re not trying to re-state normative requirements in multiple 
locations, so I’ll carefully read through this again to make sure we’re saying 
something new where we add another 2119 statement.

> 
> -- 4, bullet list:
> 
> 
> It seems odd to have 2119 keywords in a "For instance" section.

This was at the request of WG members and I’m open to wording it better. People 
wanted the protected resources to be able to count on count on the AS doing at 
least some reasonable checks on the token’s state. We can't prescribe exact AS 
behavior because the nature of tokens is going to vary so wildly (some expire, 
some don’t). What we want to do is provide a set of common checks that servers 
need to do in the right circumstances, depending on the nature of their tokens. 

> 
> --4, 6th paragraph from end
> 
> The reference to [TLS.BCP] should probably be normative.

It’s a best current practice on deployment practice of a supporting protocol, I 
think informative is the right level here but I’ll defer to other expertise if 
there’s a better form.

> 
> -- 4, last two paragraphs: 
> 
> "An authorization server offering token introspection MUST be able to
> understand the token values being presented to it during this call." and
> "the authorization server MUST be able to decrypt and validate the token
> in order to access this information."
> 
> These seem more like statements of fact than normative language.

This is a fair characterization of this section, we can change those to “needs 
to” or lowercase “must”.

 — Justin


> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to