Hi Alissa, Thanks for the wording suggestions. Both of those sound reasonable to me, so I’ll pull them into an updated draft shortly. I’ll post back here when it’s been published.
— Justin > On Jul 3, 2015, at 2:47 PM, Alissa Cooper <ali...@cooperw.in> wrote: > > Hi Justin, > > Thanks for addressing my comments. One more note below. > > On Jun 22, 2015, at 5:51 PM, Justin Richer <jric...@mit.edu > <mailto:jric...@mit.edu>> wrote: > >> Alissa, >> >> I’ve uploaded a new draft that should address your comments below: >> >> Draft: https://tools.ietf.org/html/draft-ietf-oauth-introspection-10 >> <https://tools.ietf.org/html/draft-ietf-oauth-introspection-10> >> >> Diff: >> https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt >> <https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt> >> >> Please let me know if you have any further questions, >> — Justin >> >>> On Jun 11, 2015, at 5:00 PM, Justin Richer <jric...@mit.edu >>> <mailto:jric...@mit.edu>> wrote: >>> >>> Hi Alissa, thanks for your review. Responses are inline. >>> >>>> On Jun 8, 2015, at 9:40 AM, Alissa Cooper <ali...@cooperw.in >>>> <mailto:ali...@cooperw.in>> wrote: >>>> >>>> Alissa Cooper has entered the following ballot position for >>>> draft-ietf-oauth-introspection-09: Discuss >>>> >>>> When responding, please keep the subject line intact and reply to all >>>> email addresses included in the To and CC lines. (Feel free to cut this >>>> introductory paragraph, however.) >>>> >>>> >>>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html >>>> <https://www.ietf.org/iesg/statement/discuss-criteria.html> >>>> for more information about IESG DISCUSS and COMMENT positions. >>>> >>>> >>>> The document, along with other ballot positions, can be found here: >>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-introspection/ >>>> <https://datatracker.ietf.org/doc/draft-ietf-oauth-introspection/> >>>> >>>> >>>> >>>> ---------------------------------------------------------------------- >>>> DISCUSS: >>>> ---------------------------------------------------------------------- >>>> >>>> = Section 2.1 = >>>> "The endpoint MAY allow other parameters to provide further context to >>>> the query. For instance, an authorization service may need to know >>>> the IP address of the client accessing the protected resource in >>>> order to determine the appropriateness of the token being presented." >>>> >>>> How does the protected resource know whether it needs to include such >>>> additional parameters or not? >>>> What is meant by the "appropriateness" of >>>> the token? >>>> >>>> In general if we're talking about a piece of data that could be sensitive >>>> like client IP address, it would be better for there to be specific >>>> guidelines to direct protected resources as to when this information >>>> needs to be sent. I note that Section 5 basically says such >>>> considerations are out of scope, but if this specific example is to be >>>> provided here then they seem in scope to me. >>> >>> We are trying to leave the door open to extensions and adaptations of this >>> protocol, specifically around the protected resource passing along >>> information about the client’s request. The AS might be able to help the RS >>> detect funny business on the client’s behalf (i.e., whether it’s >>> appropriate for the client to presenting the token in this context) if it >>> has that information. >>> >>> The example isn’t supposed to be normative or pull extra considerations >>> into scope of this protocol but instead to point out where it could go. > > > I think there are two more changes that could make this crystal clear. > > In 2.1: > s/The definition of any other parameters/The definition of this or any other > parameters/ > > In 5: > s/such information could have additional privacy considerations/such > information could have additional privacy considerations that extension > specifications should detail./ > > Thanks, > Alissa > >>> >>> Do you have a suggestion for rewording this? Perhaps it would be best to >>> move all of this language to the security considerations section, as it’s >>> more guidance for what extensions to this spec would need to think about as >>> opposed to what pure implementations of this spec would need. >>> >>>> >>>> = Section 5 = >>>> "One way to limit disclosure is to require >>>> authorization to call the introspection endpoint and to limit calls >>>> to only registered and trusted protected resource servers." >>>> >>>> I thought Section 2.1 made authorization to call the introspection >>>> endpoint mandatory. This makes it sound like it's optional. Which is it? >>> >>> Thanks for this catch. Authorization used to be optional, and it looks like >>> we missed updating this text. I’ll fix that in the next revision. >>> >>>> >>>> >>>> ---------------------------------------------------------------------- >>>> COMMENT: >>>> ---------------------------------------------------------------------- >>>> >>>> = Section 1.1 = >>>> There is no reference to RFC2119 here, which may be okay but most >>>> documents include it if they use normative language (I think). >>>> >>> >>> Not sure how that happened, this should have been included by the xml2rfc >>> tooling, I’ll look into it. >>> >>>> = Section 2 = >>>> "The >>>> definition of an active token is up to the authorization server, but >>>> this is commonly a token that has been issued by this authorization >>>> server, is not expired, has not been revoked, and is within the >>>> purview of the protected resource making the introspection call." >>>> >>>> Is "within the purview" a term of art for OAuth 2.0? Is there a more >>>> specific way to describe what is meant here? Also, I note that in the >>>> description of the "active" member in Section 2.2, this criterion is not >>>> listed. It seems like these should be aligned. >>> >>> It is not a term of art in OAuth, and I can change that to “is able to be >>> used at the protected resource” if that’s clearer. I will also add that to >>> the list of checks about the active value, thanks. >>> >>>> >>>> = Section 2.2 = >>>> "Note that in order to avoid disclosing too much of the >>>> authorization server's state to a third party, the authorization >>>> server SHOULD NOT include any additional information about an >>>> inactive token, including why the token is inactive." >>>> >>>> Seems like this should be a MUST NOT unless there's some reason for >>>> providing anything other than active set to false. Same comment applies >>>> in Section 4. >>> >>> That’s why it’s SHOULD — which translates, roughly, to “do it this way >>> unless you’ve got a really, really good reason not to”. >>> >>>> >>>> = Section 2.3 = >>>> It seems like there is another error condition and I'm wondering if its >>>> handling needs to be specified. Per my question in Section 2.1, if it's >>>> possible that the request is properly formed but is missing some >>>> additional information that the authorization server needs to evaluate >>>> it, should there be an error condition specified for that case? >>>> >>> >>> Not by this specification, since there isn’t a mechanism for the protected >>> resource to figure out automatically what to do next. If there’s a future >>> extension specifying this extra information, it can define its own value. >>> >>> — Justin >>> >>>> >>>> _______________________________________________ >>>> OAuth mailing list >>>> OAuth@ietf.org <mailto:OAuth@ietf.org> >>>> https://www.ietf.org/mailman/listinfo/oauth >>>> <https://www.ietf.org/mailman/listinfo/oauth> >>> >> >
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth