Thanks Martin for the comments and Benjamin for addressing some of them!
Comments on the remaining ones:

    > (2.1) "...can use any signing algorithm." I presume there ought to be some
    > qualifiers on allowed algorithms?
The algorithms referred to here are the ones defined by the usual JWT/JWS, as 
in JWA (RFC7518). The reader should be able to get it from the context without 
ambiguity.

    > (4) I presume it's important that any resouree server rejection of the 
token
    > should be constant-time. Is this somewhere in the RFC tree, or do we need 
to
    > explicitly say it here and/or in Security Considerations?
I am thinking of analogous descriptions in other specs and I don’t recall 
mentions of that aspect, hence I assumed we didn’t have to specify it here 
either. In particular, I glanced thru RFC6750  section 3, which this spec 
specializes for the specific JWT AT scenario, and they don’t mention that 
either.

On 4/8/21, 12:12, "Benjamin Kaduk" <ka...@mit.edu> wrote:

    On Thu, Apr 01, 2021 at 01:32:08PM -0700, Martin Duke via Datatracker wrote:
    > Martin Duke has entered the following ballot position for
    > draft-ietf-oauth-access-token-jwt-12: No Objection
    > 
    > When responding, please keep the subject line intact and reply to all
    > email addresses included in the To and CC lines. (Feel free to cut this
    > introductory paragraph, however.)
    > 
    > 
    > Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
    > for more information about IESG DISCUSS and COMMENT positions.
    > 
    > 
    > The document, along with other ballot positions, can be found here:
    > https://datatracker.ietf.org/doc/draft-ietf-oauth-access-token-jwt/
    > 
    > 
    > 
    > ----------------------------------------------------------------------
    > COMMENT:
    > ----------------------------------------------------------------------
    > 
    > (2.1) "...can use any signing algorithm." I presume there ought to be some
    > qualifiers on allowed algorithms?
    > 
    > (4) and (5) "This specification
    >    does not provide a mechanism for identifying a specific key as the
    >    one used to sign JWT access tokens."
    > 
    > I don't understand; there's a key ID right there in the token header?
    
    The concern here is about identifying keys authorized to sign JWS access
    tokens.  The server-provided metadata that lists such keys has a single
    bucket that covers keys used for signing different things, so you don't get
    any security benefit from key isolation, and a compromise of any of the
    (other) keys listed by the server would allow the attacker to sign JWT
    access tokens that are accepted as valid.
    
    So in a sense this is not about which key was actually used, but rather
    which key is supposed to be used.
    
    > (4) I presume it's important that any resouree server rejection of the 
token
    > should be constant-time. Is this somewhere in the RFC tree, or do we need 
to
    > explicitly say it here and/or in Security Considerations?
    
    (A good question, but I don't actually have the answer handy in memory.)
    
    -Ben
    
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to