Thank you everyone for the feedback.

I am currently working on the sample text, and should be complete in
the next couple days. Apologies for the delay.
On Wed, Nov 7, 2018 at 12:51 AM Brian Campbell
<bcampb...@pingidentity.com> wrote:
>
> Sure, I think they could be treated as different different 
> client_auth_methods. But there is a lot more commonality than differences to 
> the point where I think it makes sense to keep it all in a single document 
> and under a single client auth method with just the variation on which name 
> is being used.
>
> On Tue, Nov 6, 2018 at 5:11 PM Justin P Richer <jric...@mit.edu> wrote:
>>
>> Would it make sense for these to be a different client_auth_method entirely? 
>> Much the same way that we have private_key_jwt and client_secret_jwt today, 
>> both of which use the JWT assertion framework but have very different keying 
>> and security assumptions. In the same way, here you’re still validating the 
>> cert but the means by which it’s validated is different, so the auth method 
>> is arguably not going to benefit from being overloaded. Caveat, I’ve not 
>> built out a system using SANs in any meaningful way.
>>
>> If we were to do that, this draft could go forward as-is (since it’s fairly 
>> done in my opinion) and a new document could better define the semantics for 
>> the various SAN types, but while building on the framework and concepts 
>> listed in here.
>>
>> — Justin
>>
>> On Nov 6, 2018, at 3:52 PM, Evan Gilman <evan2...@gmail.com> wrote:
>>
>> Response(s) inline
>>
>> On Mon, Nov 5, 2018 at 11:53 PM Neil Madden <neil.mad...@forgerock.com> 
>> wrote:
>>
>>
>> Is there an intention that any semantics are attached to the SAN being a URI 
>> or DNS name or IP or ...? Or is it still intended to be an opaque identifier?
>>
>>
>> There are some extra things we could do if we attached type-specific
>> semantics to the matching (e.g. DNS wildcarding etc), however I think
>> that continuing to use the values as opaque identifiers would get us
>> most of what we need while keeping things simple.
>>
>> On 6 Nov 2018, at 01:55, Brian Campbell 
>> <bcampbell=40pingidentity....@dmarc.ietf.org> wrote:
>>
>> Thanks Evan for bringing this to the WG's attention. More or less the same 
>> question/issue was raised yesterday in the area director's review of the 
>> document as well. I plan to bring this up as a discussion item in the 
>> meeting today. But my sense from some early discussions is that there is 
>> likely to be (rough) consensus to make some change in order to allow a SAN 
>> to be specified as the certificate subject identifier in the PKI client auth 
>> mode. We'll need to figure out the specifics of how that works. I don't 
>> think there are significant drawbacks to extending the number of client 
>> registration metadata parameters per se. I guess I've just been attracted to 
>> the idea of overloading the existing value because that felt like maybe a 
>> less invasive change. But perhaps that's shortsighted. And there's nothing 
>> inherently wrong with additional client metadata parameters.
>>
>> I don't know if we could get away with a single new parameter that could 
>> carry the value for any SAN type. Something like, { ... 
>> "tls_client_auth_san": "spiffe://trust-domain/path" ...}. In practice I feel 
>> like that'd probably be okay but in theory there's the potential for 
>> confusion of the value across different types. So probably there's a need to 
>> indicate the SAN type too. Either with more client metadata parameters like 
>> tls_client_auth_san_uir, tls_client_auth_san_email, tls_client_auth_san_ip, 
>> etc. or maybe with a structured value of some sort like {... 
>> "tls_client_auth_san": {"type":"URI", "value":"spiffe://trust-domain/path"} 
>> ... }. And then deciding which types to support and if/how to allow for the 
>> extensible types.
>>
>>
>> I am far from an authority here, but it is my understanding that one
>> of the primary drivers in supporting SAN over Subject is that the
>> values are strongly typed. While some of the advantages gained from
>> this may be less useful in our own context, I feel that it make sense
>> to keep the values separate and not overload a single value. Whether
>> that means dedicated metadata parameters or a structured parameter
>> value, I am not sure what the tradeoffs would be, but both options
>> sound suitable to me.
>>
>> Anyway, those are just some thoughts on it. And it'll be discussed more 
>> today. Suggested/proposed text is always helpful though (even if it's not 
>> used directly it can help move the conversation forward and/or help 
>> editor(s) to have prospective wording).
>>
>>
>> Great. I will work on some sample text since it sounds like that would
>> be generally helpful
>>
>> On Tue, Nov 6, 2018 at 5:53 AM Evan Gilman <evan2...@gmail.com> wrote:
>>
>>
>> Hello everyone..
>>
>> Very excited to see this draft. It helps tremendously in addressing
>> use cases around oauth client management in machine-to-machine
>> scenarios. Particularly, the PKI authentication method.
>>
>> In reviewing the document, I noticed that the only supported method
>> for identifying a client using the PKI authentication method is by
>> referencing its distinguished name. This caught me a bit by surprise -
>> many newer projects aimed at automating X.509 issuance in the
>> datacenter utilize SAN extensions rather than distinguished name in
>> order to encode identity. I am further under the impression that the
>> community is, in general, moving away from the subject extension
>> altogether in favor of SAN-based identification.
>>
>> Full disclosure: I am one of the maintainers on a project called
>> SPIFFE, which provides identity specifications for datacenter workload
>> applications. For X.509, SPIFFE encodes identity into a URI SAN
>> extension. A number of projects using SPIFFE do not configure the
>> subject with identifying information (SPIRE and Google Istio being
>> just a couple). I am also hearing of other X.509 automation projects
>> which are moving away from subject/distinguished name (even if they
>> are not using SPIFFE).
>>
>> While I think support for distinguished name is absolutely necessary,
>> I worry that supporting it solely will render it incompatible with
>> some of the more modern PKIX systems and not stand the test of time. I
>> know that I am a little late to this, and for that I apologize... but
>> I feel this is a significant point.
>>
>> I would like to open a discussion on supporting the most commonly used
>> SAN extension types in addition to distinguished name. To accomplish
>> this, amending section 2.1.2 `Client Registration Metadata` with
>> additional parameters seems appropriate. In my experience, the most
>> commonly used SAN extensions are: DNS name, IP address, URI, and email
>> address.
>>
>> Are there significant drawbacks to extending the number of client
>> registration metadata parameters? I would very much like to see this -
>> without it, many existing projects will be unable to use the spec. I
>> am happy to contribute time and text to this, assuming people feel
>> that this is a beneficial addition. Sorry again for the timing
>>
>> --
>> evan
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
>> material for the sole use of the intended recipient(s). Any review, use, 
>> distribution or disclosure by others is strictly prohibited..  If you have 
>> received this communication in error, please notify the sender immediately 
>> by e-mail and delete the message and any file attachments from your 
>> computer. Thank you.
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>
>>
>> --
>> evan
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
> material for the sole use of the intended recipient(s). Any review, use, 
> distribution or disclosure by others is strictly prohibited.  If you have 
> received this communication in error, please notify the sender immediately by 
> e-mail and delete the message and any file attachments from your computer. 
> Thank you.



-- 
evan

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to