Thanks for the useful review, Eric.  I’ll work with Brian and the crew to 
incorporate this feedback.

                                                       -- Mike

From: OAuth [mailto:oauth-boun...@ietf.org] On Behalf Of Eric Rescorla
Sent: Friday, December 29, 2017 8:41 AM
To: oauth@ietf.org; draft-ietf-oauth-token-excha...@tools.ietf.org
Subject: [OAUTH-WG] AD Review: draft-ietf-oauth-token-exchange-09

Full-featured review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D4278


As noted in inline comments, some additional words about the security model in 
which this document is embedded seem like they are needed. In particular, it's 
pretty unclear to me what checks the STS is supposed to do on a given request 
to determine whether to fulfill it. Where is that documented?

INLINE COMMENTS
View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1580>draft-ietf-oauth-token-exchange.txt:129
securing access to HTTP and RESTful resources but do not provide
everything necessary to facilitate token exchange interactions.

Can you say a bit more about what is missing here?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1581>draft-ietf-oauth-token-exchange.txt:265
REQUIRED. The value "urn:ietf:params:oauth:grant-type:token-
exchange" indicates that a token exchange is being performed.

I note that S 4.5. says that the grant_type is "defined by the authorization 
server" but that's not the case here, right?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1582>draft-ietf-oauth-token-exchange.txt:268
resource
OPTIONAL. Indicates the physical location of the target service
or resource where the client intends to use the requested security

Do you actually mean "physical" here? Presumably if it's a URI it's most likely 
a network address. I would take "physical" to mean "geographic"

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1583>draft-ietf-oauth-token-exchange.txt:304
target services with a mix of logical names and physical
locations.

But it seems you can only specify one of each, right?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1584>draft-ietf-oauth-token-exchange.txt:310
security token in the context of the service or resource where the
token will be used.

It's not clear to me where these values would come from. Can you expand on this?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1585>draft-ietf-oauth-token-exchange.txt:341
REQUIRED when the "actor_token" parameter is present in the
request but MUST NOT be included otherwise.

It's not entirely clear to me from this text how these tokens authenticate the 
request. It's clear if they are bearer tokens, but if they are some sort of 
token over a public key, then how does that work.

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1586>draft-ietf-oauth-token-exchange.txt:587
2.0 [OASIS.saml-core-2.0-os] assertion, respectively. Other URIs to
indicate other token types MAY be used.

This feels like it would be better as some kind of list (maybe bulleted)?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1587>draft-ietf-oauth-token-exchange.txt:666
it as the current actor and that can be used at
https://backend.example.com.

Where can I find the definitions of "iss" and "sub"?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1588>draft-ietf-oauth-token-exchange.txt:689
response, "act" has the same semantics and format as the claim of the
same name.

It's not entirely clear to me how I'm supposed to evaluate these from an access 
control perspective.

Is the assumption here that the entity producing the JWT has ensured the 
correct chain of issuers and subs?

Is it the RP's job to evaluate whether each entity in the chain could have 
performed the action?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1589>draft-ietf-oauth-token-exchange.txt:755
claims such as "exp", "nbf", and "aud" are not meaningful when used
within a "may_act" claim, and therefore should not be used.

I'm having a hard time understanding this claim. Can you provide an example to 
me (in email is fine, it doesn't need to be in the draft) of how it would be 
used?

View 
Inline<https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1590>draft-ietf-oauth-token-exchange.txt:1273
produced under the chairmanship of Hannes Tschofenig and Derek Atkins
with Kathleen Moriarty and Stephen Farrell serving as Security Area
Directors. The following individuals contributed ideas, feedback,

You may want to update this

REPOSITORY
rIETFREVIEW ietf-review

REVISION DETAIL
https://mozphab-ietf.devsvcdev.mozaws.net/D4278

EMAIL PREFERENCES
https://mozphab-ietf.devsvcdev.mozaws.net/settings/panel/emailpreferences/

To: ekr-moz, ekr
Cc: ekr

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to