Hi Filip,
I don’t think there’s anything new introduced in PAR that would alter
existing status quo of privacy consiserations.
As such if privacy consideration was to be added for completeness it
should be along the lines of “this document
does not expand on or otherwise alter the privacy considerations” or
“there are no new privacy considerations introduced by this document”.
OAuth 2.0 (RFC 6749) had no Privacy considerations section as it was
issued before RFC 6973 (Privacy Considerations for Internet Protocols)
existed.
I browsed through the RFCs published by this WG and the guidance
provided in RFC 6973 has not really be used and followed.
So adding no text to nearly zero text will not help that much. I believe
that a Privacy considerations section will be added to the OAuth 2.1 draft.
While doing that exercise, a shorter version of it could be included in PAR.
Hereafter is my detailed analysis:
RFC 6973 (Privacy Considerations for Internet Protocols) has been issued
in July 2013.RFCs issued earlier to RFC 6973 do not include a Privacy
Considerations section.
This is the case for :
-RFC 6749 (The OAuth 2.0 Authorization Framework)
-RFC 6750 (The OAuth 2.0 Authorization Framework: Bearer Token Usage)
-RFC 6755 (An IETF URN Sub-Namespace for OAuth)
-RFC 6819 (OAuth 2.0 Threat Model and Security Considerations)
For RFCs issued after RFC 6973, six of them don't have a have a
Privacy Considerations section. This is the case for:
-*RFC 7009 *(OAuth 2.0 Token Revocation)
- * RFC 7519* updated by RFC 8725 (JSON Web Token Best Current
Practices)
-*RFC 7636* (Proof Key for Code Exchange by OAuth Public Clients)
-*RFC 8252 *(OAuth 2.0 for Native Apps) does not have a Privacy
Considerations section
-*RFC 8414 *(OAuth 2.0 Authorization Server Metadata)
-*RFC 8628* (OAuth 2.0 Device Authorization Grant)
Eleven of them have a Privacy Considerations section. They are
enumerated below, with a copy of these sections.
-*RFC 7521* (Assertion Framework for OAuth 2.0 Client Authentication
and Authorization Grants)
8.4.Privacy Considerations
An assertion may contain privacy-sensitive information and, to prevent
disclosure of such information to unintended parties,
should only be transmitted over encrypted channels, such as TLS.In
cases where it is desirable to prevent disclosure of
certain information to the client, the assertion (or portions of it)
should be encrypted to the authorization server.
Deployments should determine the minimum amount of information
necessary to complete the exchange and include only
such information in the assertion.In some cases, the Subject
identifier can be a value representing an anonymous or pseudonymous
user, as described in Section 6.3.1.
-*RFC 7522* (Security Assertion Markup Language (SAML) 2.0 Profile for
OAuth 2.0 Client Authentication and Authorization Grants
7. Privacy Considerations
A SAML Assertion may contain privacy-sensitive information and, to
prevent disclosure of such information to unintended parties, should
only be transmitted over encrypted channels, such as Transport Layer
Security (TLS).In cases where it is desirable to prevent disclosure of
certain information to the client, the Subject and/or individual
attributes of a SAML Assertion should be encrypted to the authorization
server.
Deployments should determine the minimum amount of information necessary
to complete the exchange and include only that information in an
Assertion (typically by limiting what information is included in an
<AttributeStatement> or by omitting it altogether).In some cases, the
Subject can be a value representing an anonymous or pseudonymous user,
as described in Section 6.3.1
<https://tools.ietf.org/html/rfc7522#section-6.3.1> of the OAuth
Assertion Framework [RFC7521 <https://tools.ietf.org/html/rfc7521>].
-*RFC 7523 *JSON Web Token (JWT) Profile for OAuth 2.0 Client
Authentication and Authorization Grants
7.Privacy Considerations
A JWT may contain privacy-sensitive information and, to prevent
disclosure of such information to unintended parties, should only be
transmitted
over encrypted channels, such as Transport Layer Security (TLS).In
cases where it is desirable to prevent disclosure of certain
information to the client,
the JWT should be encrypted to the authorization server.
Deployments should determine the minimum amount of information
necessary to complete the exchange and include only such claims in the
JWT.
In some cases, the "sub" (subject) claim can be a value representing
an anonymous or pseudonymous user, as described in Section 6.3.1 of
the OAuth Assertion Framework [RFC7521].
-*RFC 7591* (OAuth 2.0 Dynamic Client Registration Protocol)
6.Privacy Considerations
As the protocol described in this specification deals almost
exclusively with information about software and not people, there are
very few
privacy concerns for its use.The notable exception is the "contacts"
field as defined in Section 2, which contains contact information for
the developers or other parties responsible for the client
software.These values are intended to be displayed to end- users and
will be available
to the administrators of the authorization server.As such, the
developer may wish to provide an email address or other contact
information expressly
dedicated to the purpose of supporting the client instead of using
their personal or professional addresses.Alternatively, the developer
may wish
to provide a collective email address for the client to allow for
continuing contact and support of the client software after the
developer moves on and
someone else takes over that responsibility.
In general, the metadata for a client, such as the client name and
software identifier, are common across all instances of a piece of
client software
and therefore pose no privacy issues for end-users. Client
identifiers, on the other hand, are often unique to a specific
instance of a client.
For clients such as web sites that are used by many users, there may
not be significant privacy concerns regarding the client identifier,
but for clients
such as native applications that are installed on a single end-user's
device, the client identifier could be uniquely tracked during OAuth
2.0 transactions
and its use tied to that single end-user.However, as the client
software still needs to be authorized by a resource owner through an
OAuth 2.0
authorization grant, this type of tracking can occur whether or not
the client identifier is unique by correlating the authenticated
resource owner with
the requesting client identifier.
Note that clients are forbidden by this specification from creating
their own client identifier.If the client were able to do so, an
individual client instance
could be tracked across multiple colluding authorization servers,
leading to privacy and security issues. Additionally, client
identifiers are generally issued
uniquely per registration request, even for the same instance of
software.In this way, an application could marginally improve privacy
by registering
multiple times and appearing to be completely separate
applications.However, this technique does incur significant usability
cost in the form of requiring
multiple authorizations per resource owner and is therefore unlikely
to be used in practice.
-*RFC 7592* (OAuth 2.0 Dynamic Client Registration Management Protocol)
6.Privacy Considerations
This specification poses no additional privacy considerations beyond
those described in the core "OAuth 2.0 Dynamic Client Registration
Protocol" [RFC7591].
-***RFC 7662 *(OAuth 2.0 Token Introspection)
5.Privacy Considerations
The introspection response may contain privacy-sensitive information
such as user identifiers for resource owners.When this is the case,
measures MUST be taken to prevent disclosure of this information to
unintended parties.One method is to transmit user identifiers as
opaque service-specific
strings, potentially returning different identifiers to each protected
resource.
If the protected resource sends additional information about the
client's request to the authorization server (such as the client's IP
address) using an extension
of this specification, such information could have additional privacy
considerations that the extension should detail.However, the nature
and implications of such
extensions are outside the scope of this specification.
Omitting privacy-sensitive information from an introspection response
is the simplest way of minimizing privacy issues.
-*RFC 7800* (Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs)
5.Privacy Considerations
A proof-of-possession key can be used as a correlation handle if the
same key is used with multiple parties.Thus, for privacy reasons, it
is recommended
that different proof-of-possession keys be used when interacting with
different parties.
-*RFC 8176* (Authentication Method Reference Values)
4.Privacy Considerations
The list of "amr" claim values returned in an ID Token reveals
information about the way that the end user authenticated to the
identity provider.
In some cases, this information may have privacy implications.
While this specification defines identifiers for particular kinds of
credentials, it does not define how these credentials are stored or
protected.
For instance, ensuring the security and privacy of biometric
credentials that are referenced by some of the defined Authentication
Method Reference
values is beyond the scope of this specification.
-***RFC 8693* (OAuth 2.0 Token Exchange)
6.Privacy Considerations
Tokens employed in the context of the functionality described herein
may contain privacy-sensitive information and, to prevent disclosure
of such information to unintended parties, MUST only be transmitted
over encrypted channels, such as Transport Layer Security (TLS).
In cases where it is desirable to prevent disclosure of certain
information to the client, the token MUST be encrypted to its intended
recipient.
Deployments SHOULD determine the minimally necessary amount of data
and only include such information in issued tokens.In some cases,
data minimization may include representing only an anonymous or
pseudonymous user.
-***RFC 8705* (OAuth 2.0 Mutual-TLS Client Authentication and
Certificate-Bound Access Tokens)
8.Privacy Considerations
In TLS versions prior to 1.3, the client's certificate is sent
unencrypted in the initial handshake and can potentially be used by
third parties
to monitor, track, and correlate client activity.This is likely of
little concern for clients that act on behalf of a significant number
of end users
because individual user activity will not be discernible amidst the
client activity as a whole.However, clients that act on behalf of a
single end user,
such as a native application on a mobile device, should use TLS
version 1.3 whenever possible or consider the potential privacy
implications of
using mutual TLS on earlier versions.
-*RFC 8707* (Resource Indicators for OAuth 2.0)
4.Privacy Considerations
In typical OAuth deployments the authorization sever is in a position
to observe and track a significant amount of user and client behavior.
It is largely just inherent to the nature of OAuth, and this document
does little to affect that.In some cases, however, such as when access
token
introspection is not being used, use of the resource parameter defined
herein may allow for tracking behavior at a somewhat more granular
and specific level than would otherwise be possible in its absence.
Denis
Filip
Odesláno z iPhonu
10. 8. 2020 v 19:21, Aaron Parecki <aa...@parecki.com>:
I agree that there is nothing unique to PAR that would justify adding
the privacy considerations mentioned to that draft. I wouldn't oppose
adding a privacy considerations section to OAuth 2.1 though.
Aaron
On Mon, Aug 10, 2020 at 9:42 AM Dick Hardt <dick.ha...@gmail.com
<mailto:dick.ha...@gmail.com>> wrote:
In the PAR meeting today, Denis requested there be a privacy
considerations section in PAR. I don't think there is anything
specific in PAR that would change the privacy considerations of
OAuth, and am checking if there is WG interest, and consensus, on
including a Privacy Considerations section in the OAuth 2.1 draft.
/Dick
ᐧ
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________ OAuth mailing list
OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth