Hi Mike,

If the working group is okay with the current text, leave it.  What you 
proposed is exactly the same as what is there.  I'll note this point in my 
ballot as I think you are leaving ambiguity that is not necessary.

After getting far enough on this, I think it was Pete who discussed this with 
you and he gave up and remained in disagreement.

Regards,
Kathleen 

Sent from my iPhone

> On Nov 24, 2015, at 10:25 PM, Mike Jones <michael.jo...@microsoft.com> wrote:
> 
> Rather than elaborating, having looked at the text we're discussing again, 
> I'm going to counter-propose that we instead simplify - sticking only to the 
> point that the paragraph is intending to get across.  Would it work for you 
> to simplify the current text:
> 
>    "A recipient might not understand the cnf claim, in which case it will 
> typically be ignored. Unless this is acceptable behavior, applications that 
> need the proof-of-possession keys communicated with it to be understood and 
> processed must require that the parts of this specification that they use be 
> implemented."
> 
> to this simpler text?
> 
>    "A recipient might not understand the cnf claim.  Applications that need 
> the proof-of-possession keys communicated with it to be understood and 
> processed must require that the parts of this specification that they use be 
> implemented."
> 
> The "must ignore" topic is already addressed in the second paragraph of 3.1 
> (and with exactly the semantics as the rest of JWT), and so doesn't have to 
> be re-raised here, as it currently is.  Re-raising it is clearly a point of 
> distraction.
> 
> For what it's worth, I don't remember any DISCUSSes on this topic (although 
> it's possible that your memory is better than mine on this point).
> 
>                Best wishes,
>                -- Mike
> 
> -----Original Message-----
> From: Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com] 
> Sent: Tuesday, November 24, 2015 7:14 PM
> To: Mike Jones <michael.jo...@microsoft.com>
> Cc: oauth@ietf.org
> Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession
> 
>> On Tue, Nov 24, 2015 at 10:10 PM, Mike Jones <michael.jo...@microsoft.com> 
>> wrote:
>> Fair question about the use of "typically".  The reason it's there is that 
>> this language in JWT [RFC 7519] Section 4 does permit applications to 
>> require that JWTs with not-understood claims be rejected, rather than 
>> ignored, even though that's not the default behavior:
>> 
>>   The set of claims that a JWT must contain to be considered valid is
>>   context dependent and is outside the scope of this specification.
>>   Specific applications of JWTs will require implementations to
>>   understand and process some claims in particular ways.  However, in
>>   the absence of such requirements, all claims that are not understood
>>   by implementations MUST be ignored.
>> 
>> So when not understood, "cnf" would typically be ignored, but might not be.
> 
> I find that confusing and am now thinking this came up in a discuss as well 
> during the review for 7519, didn't it?  Can you elaborate int eh security 
> considerations section a bit more, otherwise this text appears to be 
> conflicting and even with what you intend, it's confusing for implementers 
> and will lead to issues with interoperability.
> 
> Thanks,
> Kathleen
> 
> 
>> 
>>                                -- Mike
>> 
>> -----Original Message-----
>> From: Kathleen Moriarty [mailto:kathleen.moriarty.i...@gmail.com]
>> Sent: Tuesday, November 24, 2015 6:41 PM
>> To: Mike Jones <michael.jo...@microsoft.com>
>> Cc: oauth@ietf.org
>> Subject: Re: [OAUTH-WG] AD review of 
>> draft-ietf-oauth-proof-of-possession
>> 
>> Hi Mike,
>> 
>> Thanks for the quick turn-around.  Just one more comment on my comments.
>> 
>>> On Tue, Nov 24, 2015 at 9:10 PM, Mike Jones <michael.jo...@microsoft.com> 
>>> wrote:
>>> Thanks for your review comments, Kathleen.  Responses are inline below...
>>> 
>>>> -----Original Message-----
>>>> From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Kathleen 
>>>> Moriarty
>>>> Sent: Tuesday, November 24, 2015 9:44 AM
>>>> To: oauth@ietf.org
>>>> Subject: [OAUTH-WG] AD review of 
>>>> draft-ietf-oauth-proof-of-possession
>>>> 
>>>> Hi,
>>>> 
>>>> Thank you all for your work on this draft!  I just have a few questions:
>>>> 
>>>> 1. Security considerations section says:
>>>> 
>>>> "All of the normal security issues, especially in relationship to
>>>>   comparing URIs and dealing with unrecognized values, that are
>>>>   discussed in JWT [JWT] also apply here."
>>>> 
>>>> I find that to be odd phrasing that would likely be picked up in 
>>>> subsequent reviews.  Please remove the word "normal" so that all of 
>>>> the security issues discusses in JWT are included.  Are there other 
>>>> 'normal considerations in addition to those in JWT that need to be 
>>>> listed?  The phrasing reads as if that may the case and would be 
>>>> better to include them all or pointers or change the phrasing.
>>> 
>>> You're right.  I removed this awkward wording.
>>> 
>>>> 2. Also in the security considerations section,
>>>> 
>>>>   "A recipient may not understand the newly introduced "cnf" claim and
>>>>   may consequently treat it as a bearer token."
>>>> 
>>>> What is the proper handling requirement when an unknown claim is 
>>>> present?  Section 3.1 says:
>>>>  "When a recipient receives a "cnf" claim with a
>>>>   member that it does not understand, it MUST ignore that member."
>>>> 
>>>> Is this why it is treated as a bearer token rather than being 
>>>> rejected?  Is this really the action you want to see with cnf?  Why 
>>>> isn't there an error and a resend as a bearer token so that parties 
>>>> understand (or have an opportunity to understand) that there were issues?
>>>> 
>>>> Then the following text in the security section says:
>>>>  "While this is a
>>>>   legitimate concern, it is outside the scope of this specification,
>>>>   since demonstration the possession of the key associated with the
>>>>   "cnf" claim is not covered by this specification. For more 
>>>> details,
>>>> 
>>>> How is this outside of the scope of this draft?  cnf is defined in 
>>>> this draft, so handling should be covered in this draft.  A pointer 
>>>> to the POP architecture draft is not helpful as it is not defined 
>>>> there, it's covered int his draft.  Should this text just be removed 
>>>> and replaced with more explicit handling information int he body of this 
>>>> draft?
>>> 
>>> Good catch.  JWT [RFC 7519] Section 4 says that claims that are not 
>>> understood must be ignored unless otherwise specified by the application.  
>>> This allows new claims to be dynamically added without breaking existing 
>>> applications.  For the same reason, I have incorporated this language about 
>>> understanding claims from 7519, but having it be about understanding 
>>> confirmation members.  Ultimately, what features must be implemented are 
>>> always up to the application, just as with JWT claims.
>> 
>> The new text in Section 3.1 looks good.  I'm not sure why the word 
>> "typically" appears int he new text of the security considerations section 
>> though after reading the new text in 3.1.  Wouldn't it just be ignored since 
>> 3.1 now says:
>> 
>>   "However, in the absence of such requirements,
>>    all confirmation members that are not understood by implementations
>>    MUST be ignored."
>> 
>> Thanks,
>> Kathleen
>> 
>> 
>>> 
>>>> Thanks!
>>>> 
>>>> --
>>>> 
>>>> Best regards,
>>>> Kathleen
>>>> 
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> 
>>>                                Thanks again,
>>>                                -- Mike
>> 
>> 
>> 
>> --
>> 
>> Best regards,
>> Kathleen
> 
> 
> 
> -- 
> 
> Best regards,
> Kathleen

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to