Alissa,

I’ve incorporated your suggested wording changes into the latest version of the 
document:

Draft: https://tools.ietf.org/html/draft-ietf-oauth-introspection-11

Diff: https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-11.txt

Hopefully this will be sufficient to clear the DISCUSS. Thanks for your 
thorough review and feedback!

 — Justin


> On Jul 3, 2015, at 3:16 PM, Justin Richer <jric...@mit.edu> wrote:
> 
> Hi Alissa,
> 
> Thanks for the wording suggestions. Both of those sound reasonable to me, so 
> I’ll pull them into an updated draft shortly. I’ll post back here when it’s 
> been published.
> 
>  — Justin
> 
>> On Jul 3, 2015, at 2:47 PM, Alissa Cooper <ali...@cooperw.in 
>> <mailto:ali...@cooperw.in>> wrote:
>> 
>> Hi Justin,
>> 
>> Thanks for addressing my comments. One more note below.
>> 
>> On Jun 22, 2015, at 5:51 PM, Justin Richer <jric...@mit.edu 
>> <mailto:jric...@mit.edu>> wrote:
>> 
>>> Alissa,
>>> 
>>> I’ve uploaded a new draft that should address your comments below:
>>> 
>>> Draft: https://tools.ietf.org/html/draft-ietf-oauth-introspection-10 
>>> <https://tools.ietf.org/html/draft-ietf-oauth-introspection-10>
>>> 
>>> Diff: 
>>> https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt 
>>> <https://tools.ietf.org/rfcdiff?url2=draft-ietf-oauth-introspection-10.txt>
>>> 
>>> Please let me know if you have any further questions,
>>>  — Justin
>>> 
>>>> On Jun 11, 2015, at 5:00 PM, Justin Richer <jric...@mit.edu 
>>>> <mailto:jric...@mit.edu>> wrote:
>>>> 
>>>> Hi Alissa, thanks for your review. Responses are inline.
>>>> 
>>>>> On Jun 8, 2015, at 9:40 AM, Alissa Cooper <ali...@cooperw.in 
>>>>> <mailto:ali...@cooperw.in>> wrote:
>>>>> 
>>>>> Alissa Cooper has entered the following ballot position for
>>>>> draft-ietf-oauth-introspection-09: Discuss
>>>>> 
>>>>> When responding, please keep the subject line intact and reply to all
>>>>> email addresses included in the To and CC lines. (Feel free to cut this
>>>>> introductory paragraph, however.)
>>>>> 
>>>>> 
>>>>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html 
>>>>> <https://www.ietf.org/iesg/statement/discuss-criteria.html>
>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>> 
>>>>> 
>>>>> The document, along with other ballot positions, can be found here:
>>>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-introspection/ 
>>>>> <https://datatracker.ietf.org/doc/draft-ietf-oauth-introspection/>
>>>>> 
>>>>> 
>>>>> 
>>>>> ----------------------------------------------------------------------
>>>>> DISCUSS:
>>>>> ----------------------------------------------------------------------
>>>>> 
>>>>> = Section 2.1 =
>>>>> "The endpoint MAY allow other parameters to provide further context to
>>>>>  the query.  For instance, an authorization service may need to know
>>>>>  the IP address of the client accessing the protected resource in
>>>>>  order to determine the appropriateness of the token being presented."
>>>>> 
>>>>> How does the protected resource know whether it needs to include such
>>>>> additional parameters or not?
>>>>> What is meant by the "appropriateness" of
>>>>> the token? 
>>>>> 
>>>>> In general if we're talking about a piece of data that could be sensitive
>>>>> like client IP address, it would be better for there to be specific
>>>>> guidelines to direct protected resources as to when this information
>>>>> needs to be sent. I note that Section 5 basically says such
>>>>> considerations are out of scope, but if this specific example is to be
>>>>> provided here then they seem in scope to me.
>>>> 
>>>> We are trying to leave the door open to extensions and adaptations of this 
>>>> protocol, specifically around the protected resource passing along 
>>>> information about the client’s request. The AS might be able to help the 
>>>> RS detect funny business on the client’s behalf (i.e., whether it’s 
>>>> appropriate for the client to presenting the token in this context) if it 
>>>> has that information. 
>>>> 
>>>> The example isn’t supposed to be normative or pull extra considerations 
>>>> into scope of this protocol but instead to point out where it could go.
>> 
>> 
>> I think there are two more changes that could make this crystal clear. 
>> 
>> In 2.1:
>> s/The definition of any other parameters/The definition of this or any other 
>> parameters/
>> 
>> In 5:
>> s/such information could have additional privacy considerations/such 
>> information could have additional privacy considerations that extension 
>> specifications should detail./
>> 
>> Thanks,
>> Alissa
>> 
>>>> 
>>>> Do you have a suggestion for rewording this? Perhaps it would be best to 
>>>> move all of this language to the security considerations section, as it’s 
>>>> more guidance for what extensions to this spec would need to think about 
>>>> as opposed to what pure implementations of this spec would need.
>>>> 
>>>>> 
>>>>> = Section 5 =
>>>>> "One way to limit disclosure is to require
>>>>>  authorization to call the introspection endpoint and to limit calls
>>>>>  to only registered and trusted protected resource servers."
>>>>> 
>>>>> I thought Section 2.1 made authorization to call the introspection
>>>>> endpoint mandatory. This makes it sound like it's optional. Which is it?
>>>> 
>>>> Thanks for this catch. Authorization used to be optional, and it looks 
>>>> like we missed updating this text. I’ll fix that in the next revision.
>>>> 
>>>>> 
>>>>> 
>>>>> ----------------------------------------------------------------------
>>>>> COMMENT:
>>>>> ----------------------------------------------------------------------
>>>>> 
>>>>> = Section 1.1 =
>>>>> There is no reference to RFC2119 here, which may be okay but most
>>>>> documents include it if they use normative language (I think).
>>>>> 
>>>> 
>>>> Not sure how that happened, this should have been included by the xml2rfc 
>>>> tooling, I’ll look into it.
>>>> 
>>>>> = Section 2 =
>>>>> "The
>>>>>  definition of an active token is up to the authorization server, but
>>>>>  this is commonly a token that has been issued by this authorization
>>>>>  server, is not expired, has not been revoked, and is within the
>>>>>  purview of the protected resource making the introspection call."
>>>>> 
>>>>> Is "within the purview" a term of art for OAuth 2.0? Is there a more
>>>>> specific way to describe what is meant here? Also, I note that in the
>>>>> description of the "active" member in Section 2.2, this criterion is not
>>>>> listed. It seems like these should be aligned.
>>>> 
>>>> It is not a term of art in OAuth, and I can change that to “is able to be 
>>>> used at the protected resource” if that’s clearer. I will also add that to 
>>>> the list of checks about the active value, thanks.
>>>> 
>>>>> 
>>>>> = Section 2.2 =
>>>>> "Note that in order to avoid disclosing too much of the
>>>>>  authorization server's state to a third party, the authorization
>>>>>  server SHOULD NOT include any additional information about an
>>>>>  inactive token, including why the token is inactive."
>>>>> 
>>>>> Seems like this should be a MUST NOT unless there's some reason for
>>>>> providing anything other than active set to false. Same comment applies
>>>>> in Section 4.
>>>> 
>>>> That’s why it’s SHOULD — which translates, roughly, to “do it this way 
>>>> unless you’ve got a really, really good reason not to”.
>>>> 
>>>>> 
>>>>> = Section 2.3 =
>>>>> It seems like there is another error condition and I'm wondering if its
>>>>> handling needs to be specified. Per my question in Section 2.1, if it's
>>>>> possible that the request is properly formed but is missing some
>>>>> additional information that the authorization server needs to evaluate
>>>>> it, should there be an error condition specified for that case?
>>>>> 
>>>> 
>>>> Not by this specification, since there isn’t a mechanism for the protected 
>>>> resource to figure out automatically what to do next. If there’s a future 
>>>> extension specifying this extra information, it can define its own value.
>>>> 
>>>> — Justin
>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth 
>>>>> <https://www.ietf.org/mailman/listinfo/oauth>
>>>> 
>>> 
>> 
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to