> Am 24.07.2019 um 09:50 schrieb Tomek Stojecki 
> <tstojecki=40yahoo....@dmarc.ietf.org>:
> 
> I agree that 6.1 takes too broad of a swipe, but I'd say with same-site 
> cookies and (sadly) without token-binding, the suggestion to use cookie based 
> session following oauth/oidc auth is a good one and should be incorporated 
> perhaps in 6.2?

Sure. Such mechanisms are also used in a backend based architecture for OAuth, 
just as a complement and not an alternative to OAuth

> 
> Leo sums it up well here:
>> We need to be clear on the distinction between browser based apps that hold 
>> the token(s) in the browser space, vs. those that don't.  I agree that with 
>> this "common domain" architecture, the tokens should not be held in the 
>> browser, but it doesn't follow that oauth should not be used at all.  
> 
> Finally and sorry if this is off-topic, why isn't this discussion taking 
> place in github? Aaron has uploaded the document there. This medium, while 
> good for some things, seems to have a lot of shortcomings for this sort of 
> discussion and review. 

Well, since this is IETF ;-)

> 
> Thanks,
> Tomek
> 
> 
> On Wednesday, July 24, 2019, 04:14:14 AM GMT+2, David Waite 
> <da...@alkaline-solutions.com> wrote: 
> 
> 
> 
> 
> 
> 
> 
>> On Jul 23, 2019, at 12:47 PM, Brian Campbell 
>> <bcampbell=40pingidentity....@dmarc.ietf.org> wrote:
>> 
>> 
>> 
>>> On Mon, Jul 22, 2019 at 7:31 AM Torsten Lodderstedt 
>>> <tors...@lodderstedt..net> wrote:
>>> 
>>> 2) Regarding architectures: I think this BCP should focus on 
>>> recommendations for securely implementing OAuth in the different potential 
>>> architecture.. I don’t think we should get into the business of 
>>> recommending and assessing other solutions (e.g. section 6.1.). Just to 
>>> give you an example: Section 6.1. states 
>>> 
>>> "OAuth and OpenID Connect provide very little benefit in this deployment 
>>> scenario, so it is recommended to reconsider whether you need OAuth or 
>>> OpenID Connect at all in this case.”
>>> 
>>> Really? What experiences is this statement based on? In my experience, 
>>> sharing the same domain == host name tells you nothing about the overall 
>>> architecture of a certain deployment. There may be several reasons why 
>>> OAuth could be good choice in such a scenario, e.g. security considerations 
>>> (since your common domain is just a proxy server encapsulating a whole 
>>> universe of systems) or even modularity as an architecture principle. 
>>> 
>>> I suggest to remove section c. and to rephrase the second paragraph of the 
>>> abstract.
>> 
>> I believe the experiences that the statement is based on are the predominant 
>> practice over the course of much of the history of the web of using a cookie 
>> to maintain an authenticated HTTP session in web applications. When the 
>> script of the browser-based application is served from a domain that can 
>> share cookies with the domain of the API, then cookies can still be used to 
>> authorize requests (even if those requests are API calls rather than full 
>> page HTTP request/response). And I do believe that's likely a better 
>> decision in a lot of such cases. 
>> 
>> That authenticated HTTP session may be establish from a username/password 
>> form submission, FIDO/WebAuthn, or whatever.  Even as a result of an OpenID 
>> Connect flow. Or even SAML for that matter. But the the requests after that 
>> are authorized by the cookie. 
>> 
>> I think there's a tendency to assume because SPA style apps make API calls, 
>> they simply must use OAuth. Because API implies OAuth in the minds of many 
>> (which is a sign of its success). But OAuth isn't necessarily the only thing 
>> that can be used for API authorization. Cookies work too. I think/hope 
>> that's what Section 6.1. is getting at - providing some potential guidance 
>> that OAuth might not necessarily be the right choice in those cases where a 
>> common domain allows for a cookie. Perhaps the text in that section could be 
>> phased in a different or better way, but I think its useful to have some 
>> mention of in this document. 
>> 
>> Although taking out "and OpenID Connect" from the sentence quoted above 
>> might be more appropriate and alleviate some confusion. 
>> 
>> 
> 
> Perhaps it should be turned into a stated document assumption (that the 
> reader has decided to use OAuth) rather than guidance later in the document 
> (that OAuth may not be the best fit)
> 
> There is AFAIK no set of security considerations or best practices we can 
> point to for “use some non-standardized system for acquiring and using 
> cookies” or even “here’s a standard for acquiring and using cookies”. 
> Omitting some of the moving pieces of OAuth might alleviate some security 
> concerns, but also resurrect some other security issues. The most immediate 
> example that comes to mind: using a HttpOnly cookie-as-token instead of an 
> access token may mean that you can’t have injected scripts exfiltrate the 
> token, but applying the access token was also a mitigation against browser 
> CSRF for your APIs.
> 
> -DW
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to