Alissa,

I’ve uploaded a new draft that should address your comments below:

Draft: https://tools.ietf.org/html/draft-ietf-oauth-introspection-10 
<https://tools.ietf.org/html/draft-ietf-oauth-introspection-10>

Diff: https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt 
<https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt>

Please let me know if you have any further questions,
 — Justin

> On Jun 11, 2015, at 5:00 PM, Justin Richer <jric...@mit.edu> wrote:
> 
> Hi Alissa, thanks for your review. Responses are inline.
> 
>> On Jun 8, 2015, at 9:40 AM, Alissa Cooper <ali...@cooperw.in> wrote:
>> 
>> Alissa Cooper has entered the following ballot position for
>> draft-ietf-oauth-introspection-09: Discuss
>> 
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut this
>> introductory paragraph, however.)
>> 
>> 
>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>> 
>> 
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-oauth-introspection/
>> 
>> 
>> 
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>> 
>> = Section 2.1 =
>> "The endpoint MAY allow other parameters to provide further context to
>>  the query.  For instance, an authorization service may need to know
>>  the IP address of the client accessing the protected resource in
>>  order to determine the appropriateness of the token being presented."
>> 
>> How does the protected resource know whether it needs to include such
>> additional parameters or not?
>> What is meant by the "appropriateness" of
>> the token? 
>> 
>> In general if we're talking about a piece of data that could be sensitive
>> like client IP address, it would be better for there to be specific
>> guidelines to direct protected resources as to when this information
>> needs to be sent. I note that Section 5 basically says such
>> considerations are out of scope, but if this specific example is to be
>> provided here then they seem in scope to me.
> 
> We are trying to leave the door open to extensions and adaptations of this 
> protocol, specifically around the protected resource passing along 
> information about the client’s request. The AS might be able to help the RS 
> detect funny business on the client’s behalf (i.e., whether it’s appropriate 
> for the client to presenting the token in this context) if it has that 
> information. 
> 
> The example isn’t supposed to be normative or pull extra considerations into 
> scope of this protocol but instead to point out where it could go.
> 
> Do you have a suggestion for rewording this? Perhaps it would be best to move 
> all of this language to the security considerations section, as it’s more 
> guidance for what extensions to this spec would need to think about as 
> opposed to what pure implementations of this spec would need.
> 
>> 
>> = Section 5 =
>> "One way to limit disclosure is to require
>>  authorization to call the introspection endpoint and to limit calls
>>  to only registered and trusted protected resource servers."
>> 
>> I thought Section 2.1 made authorization to call the introspection
>> endpoint mandatory. This makes it sound like it's optional. Which is it?
> 
> Thanks for this catch. Authorization used to be optional, and it looks like 
> we missed updating this text. I’ll fix that in the next revision.
> 
>> 
>> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> = Section 1.1 =
>> There is no reference to RFC2119 here, which may be okay but most
>> documents include it if they use normative language (I think).
>> 
> 
> Not sure how that happened, this should have been included by the xml2rfc 
> tooling, I’ll look into it.
> 
>> = Section 2 =
>> "The
>>  definition of an active token is up to the authorization server, but
>>  this is commonly a token that has been issued by this authorization
>>  server, is not expired, has not been revoked, and is within the
>>  purview of the protected resource making the introspection call."
>> 
>> Is "within the purview" a term of art for OAuth 2.0? Is there a more
>> specific way to describe what is meant here? Also, I note that in the
>> description of the "active" member in Section 2.2, this criterion is not
>> listed. It seems like these should be aligned.
> 
> It is not a term of art in OAuth, and I can change that to “is able to be 
> used at the protected resource” if that’s clearer. I will also add that to 
> the list of checks about the active value, thanks.
> 
>> 
>> = Section 2.2 =
>> "Note that in order to avoid disclosing too much of the
>>  authorization server's state to a third party, the authorization
>>  server SHOULD NOT include any additional information about an
>>  inactive token, including why the token is inactive."
>> 
>> Seems like this should be a MUST NOT unless there's some reason for
>> providing anything other than active set to false. Same comment applies
>> in Section 4.
> 
> That’s why it’s SHOULD — which translates, roughly, to “do it this way unless 
> you’ve got a really, really good reason not to”.
> 
>> 
>> = Section 2.3 =
>> It seems like there is another error condition and I'm wondering if its
>> handling needs to be specified. Per my question in Section 2.1, if it's
>> possible that the request is properly formed but is missing some
>> additional information that the authorization server needs to evaluate
>> it, should there be an error condition specified for that case?
>> 
> 
> Not by this specification, since there isn’t a mechanism for the protected 
> resource to figure out automatically what to do next. If there’s a future 
> extension specifying this extra information, it can define its own value.
> 
> — Justin
> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to