Thank you all for your work on this draft!
On Fri, Jul 10, 2015 at 12:57 PM, William Denniss <wdenn...@google.com> wrote: > Looks good to me. I think it's a lot clearer now, thanks for the update > John. > > Unrelated, I noticed a typo in "7.5. TLS security considerations", the > word 'Curent'. > > On Fri, Jul 10, 2015 at 9:33 AM, Kathleen Moriarty < > kathleen.moriarty.i...@gmail.com> wrote: > >> Thanks, Brian! >> >> William? Are you good with this version? >> >> On Fri, Jul 10, 2015 at 12:11 PM, Brian Campbell < >> bcampb...@pingidentity.com> wrote: >> >>> I think -15 does address the inconsistency. >>> >>> On Fri, Jul 10, 2015 at 9:36 AM, John Bradley <ve7...@ve7jtb.com> wrote: >>> >>>> Yes I believe I I addressed these comments as part of Barry’s discuss >>>> points. >>>> They were comments on the changes that Barry introduced that caused a >>>> inconsistency. I resolved that in 15. >>>> >>>> I think it is good to go. >>>> >>>> >>>> On Jul 10, 2015, at 12:29 PM, Kathleen Moriarty < >>>> kathleen.moriarty.i...@gmail.com> wrote: >>>> >>>> John, >>>> >>>> The updates were included in the version I approved for posting that >>>> also addressed Barry's discuss points, correct? >>>> >>>> Are we good with the current version to move forward: >>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-spop/ >>>> >>>> Thank you, >>>> Kathleen >>>> >>>> On Thu, Jul 9, 2015 at 2:46 PM, John Bradley <ve7...@ve7jtb.com> wrote: >>>> >>>>> I have made some edits to make it consistent. They are checked into >>>>> the butbucket repo nat and I use, but we can’t update the official draft >>>>> during the freeze before the IETF meeting. >>>>> >>>>> https://bitbucket.org/Nat/oauth-spop >>>>> >>>>> On Jul 9, 2015, at 3:19 PM, Brian Campbell <bcampb...@pingidentity.com> >>>>> wrote: >>>>> >>>>> I agree with William that it's a little confusing. I get that there's >>>>> a desire to discourage using "plain" but perhaps the language (especially >>>>> the MUST NOT in 7.2) should be lightened up just a bit? >>>>> >>>>> On Wed, Jul 8, 2015 at 8:22 PM, William Denniss <wdenn...@google.com> >>>>> wrote: >>>>> >>>>>> Following up the discussion on today's NAPPS call, I understand why >>>>>> plain is not presented as the recommended approach in the spec (though it >>>>>> still has some value over not doing PKCE at all, in that it mitigates >>>>>> against the current known attack where a rogue app registers the same >>>>>> custom URI scheme as another), but I feel that after all the back and >>>>>> forth >>>>>> the picture is a little confusing. >>>>>> >>>>>> In particular, 4.2 and 4.4.1 include some examples where plain is >>>>>> supported: >>>>>> >>>>>> 4.2 >>>>>>> Clients SHOULD use the S256 transformation. The plain >>>>>>> transformation is for compatibility with existing deployments and for >>>>>>> constrained environments that can't use the S256 transformation. >>>>>>> >>>>>> >>>>>> >>>>>> 4.4.1. >>>>>>> If the client is capable of using "S256", it MUST use "S256", as >>>>>>> "S256" is Mandatory To Implement (MTI) on the server. Clients are >>>>>>> permitted >>>>>>> to use "plain" only if they cannot support "S256" for some technical >>>>>>> reason >>>>>>> and knows that the server supports "plain". >>>>>> >>>>>> >>>>>> But then 7.2 is very vocal that it MUST NOT be used for new >>>>>> implementations: >>>>>> >>>>>> 7.2 >>>>>>> Because of this, "plain" SHOULD NOT be used, and exists only >>>>>>> for compatibility with deployed implementations where the request path >>>>>>> is already protected. The "plain" method MUST NOT be used in >>>>>>> new implementations. >>>>>> >>>>>> >>>>>> What if those new implementations are constrained, as indicated in >>>>>> 4.2 and 4.4.1? >>>>>> >>>>>> >>>>>> Also, while S256 is clearly indicated as MTI, little is said about >>>>>> "plain", although it's alluded to that it's not MTI in 4.4.1 ("and knows >>>>>> that the server supports "plain""). >>>>>> >>>>>> Should we be more explicit upfront that "plain" is optional for >>>>>> servers to support, if that's the intention? >>>>>> >>>>>> >>>>>> On Tue, Jul 7, 2015 at 10:51 PM, William Denniss <wdenn...@google.com >>>>>> > wrote: >>>>>> >>>>>>> t_m works for me, I just think we should have some indication that >>>>>>> it's the name of the transform. Will you also update where it is >>>>>>> referenced >>>>>>> in the description below Figure 2? >>>>>>> >>>>>>> >>>>>>> >>>>>>> On Tue, Jul 7, 2015 at 6:28 PM, John Bradley <ve7...@ve7jtb.com> >>>>>>> wrote: >>>>>>> >>>>>>>> Thanks, I fixed my finger dyslexia for the next draft. >>>>>>>> >>>>>>>> I changed it to t_m rather than “t” I think that is clearer. If I >>>>>>>> were to do it the other way XML2RFC would have double quotes in the >>>>>>>> text >>>>>>>> version. >>>>>>>> >>>>>>>> John B. >>>>>>>> >>>>>>>> On Jul 7, 2015, at 9:38 PM, William Denniss <wdenn...@google.com> >>>>>>>> wrote: >>>>>>>> >>>>>>>> In version 14, there's a typo on this line ("deso") in Section 7.2: >>>>>>>> >>>>>>>> `"plain" method deso not protect` >>>>>>>> >>>>>>>> Also, in the 1.1 Protocol Flow diagram, regarding the text: >>>>>>>> >>>>>>>> `+ t(code_verifier), t` >>>>>>>> >>>>>>>> I wonder if it makes more sense to represent as `+ >>>>>>>> t(code_verifier), "t"` (note the quotes on the second 't') given >>>>>>>> that it's a string representation of the method that's being sent? >>>>>>>> >>>>>>>> >>>>>>>> On Mon, Jul 6, 2015 at 4:05 PM, <internet-dra...@ietf.org> wrote: >>>>>>>> >>>>>>>>> >>>>>>>>> A New Internet-Draft is available from the on-line Internet-Drafts >>>>>>>>> directories. >>>>>>>>> This draft is a work item of the Web Authorization Protocol >>>>>>>>> Working Group of the IETF. >>>>>>>>> >>>>>>>>> Title : Proof Key for Code Exchange by OAuth >>>>>>>>> Public Clients >>>>>>>>> Authors : Nat Sakimura >>>>>>>>> John Bradley >>>>>>>>> Naveen Agarwal >>>>>>>>> Filename : draft-ietf-oauth-spop-14.txt >>>>>>>>> Pages : 20 >>>>>>>>> Date : 2015-07-06 >>>>>>>>> >>>>>>>>> Abstract: >>>>>>>>> OAuth 2.0 public clients utilizing the Authorization Code Grant >>>>>>>>> are >>>>>>>>> susceptible to the authorization code interception attack. This >>>>>>>>> specification describes the attack as well as a technique to >>>>>>>>> mitigate >>>>>>>>> against the threat through the use of Proof Key for Code >>>>>>>>> Exchange >>>>>>>>> (PKCE, pronounced "pixy"). >>>>>>>>> >>>>>>>>> >>>>>>>>> The IETF datatracker status page for this draft is: >>>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-spop/ >>>>>>>>> >>>>>>>>> There's also a htmlized version available at: >>>>>>>>> https://tools.ietf.org/html/draft-ietf-oauth-spop-14 >>>>>>>>> >>>>>>>>> A diff from the previous version is available at: >>>>>>>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-spop-14 >>>>>>>>> >>>>>>>>> >>>>>>>>> Please note that it may take a couple of minutes from the time of >>>>>>>>> submission >>>>>>>>> until the htmlized version and diff are available at >>>>>>>>> tools.ietf.org. >>>>>>>>> >>>>>>>>> Internet-Drafts are also available by anonymous FTP at: >>>>>>>>> ftp://ftp.ietf.org/internet-drafts/ >>>>>>>>> >>>>>>>>> _______________________________________________ >>>>>>>>> OAuth mailing list >>>>>>>>> OAuth@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>>> >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> OAuth mailing list >>>>>>>> OAuth@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>> >>>>>> _______________________________________________ >>>>>> OAuth mailing list >>>>>> OAuth@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>>> >>>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> OAuth mailing list >>>>> OAuth@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/oauth >>>>> >>>>> >>>> >>>> >>>> -- >>>> >>>> Best regards, >>>> Kathleen >>>> >>>> >>>> >>> >> >> >> -- >> >> Best regards, >> Kathleen >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org >> https://www.ietf.org/mailman/listinfo/oauth >> >> > -- Best regards, Kathleen
_______________________________________________ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth