Hi Torsten!

Thanks for the response.  More inline ...

> -----Original Message-----
> From: Torsten Lodderstedt <tors...@lodderstedt.net>
> Sent: Tuesday, October 18, 2022 9:00 AM
> To: Roman Danyliw <r...@cert.org>
> Cc: oauth@ietf.org; Brian Campbell <bcampb...@pingidentity.com>;
> jric...@mit.edu
> Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-rar-12
> 
> Hi Roman,
> 
> thanks for you review.
> 
> I’m trying to do the next round for the outstanding issues you raised.
> 
> > Am 15.09.2022 um 00:30 schrieb Roman Danyliw <r...@cert.org>:
> >
> > Hi!
> >
> > I performed an AD review of draft-ietf-oauth-rar-12.  Thanks for this
> document.  My feedback is as follows:
> >
> > ** Section 2. Editorial
> >
> > This field MUST be compared using an exact byte match of the string
> >   value against known types by the AS.
> >
> > Consider if you want to introduce how the lack of match will be handled here
> - it is covered later.
> 
> I’m not sure how to handle this as there is no direct consequence (in the 
> sense
> of error condition) other then that different byte arrays constitute different
> types.
> 
> We could state something like this: "String values with different byte
> representations constitute different types.“ ?

Works for me.

> >
> > ** Section 2.2.
> >
> > All data fields are OPTIONAL for use by a given API
> >   definition.
> >
> > I don't follow how this is true in the general case.  I was under the 
> > impression
> that this section defined what is expected to be common fields.  Couldn't some
> AS with a particular type require their presence?
> >
> > ** Section 3.  Editorial
> >
> > OLD
> > In case of authorization requests as defined in [RFC6749],
> >   implementors MAY consider to use
> >
> > NEW
> > In case of authorization requests as defined in [RFC6749],
> >   implementors MAY consider using ...
> >
> > ** Section 3.  Typo. s/intiate/initiate/
> >
> > ** Section 5.  Typo.
> >
> > OLD
> > authorization details type
> >   or authorization details
> >
> > NEW
> > authorization_details type
> >   or authorization_details
> 
> The spec uses authorization details types to refer to the general concept and
> authorization_details to refer to the parameter. I think the former is
> appropriate at this place.

Understood.

> >
> > ** Section 6.1
> >
> >  However, when comparing a new request to an existing request,
> >   authorization servers can use the same processing techniques as used
> >   in granting the request in the first place to determine if a resource
> >   owner needs to authorize the request.
> >
> > Why is it possible to assess two arbitrary requests in this case to 
> > determine "if
> a resource owner needs to authorize the request", but the prior paragraph
> explicitly calls out that comparing two arbitrary requests is not feasible?  
> To me
> is seems like comparing two requests to understand if more or less permissions
> are being requested is equivalent to determining if a new request exceed the
> current request to determine if going back to the resource owner is needed.
> >
> > ** Section 6.1.  Typo. s/isaunce/issuance/
> >
> > ** Section 7.
> >
> >   If the client does not specify
> >   the authorization_details token request parameters, the AS determines
> >   the resulting authorization details at its discretion.  The
> >   authorization server MAY consider the values of other parameters such
> >   as resource and scope if they are present during this processing, and
> >   the details of such considerations are outside the scope of this
> >   specification.
> >
> > This guidance seems to indicate the use of the scope parameter is optional 
> > in
> determining the authorization details.  Section 3.1 says "The AS MUST consider
> both sets of requirements in combination with each other for the given
> authorization request."  My read is that this is conflicting guidance and 
> Section
> 3.1 is correct.
> 
> Justin: „You aren’t required to use “scope” in order to use
> “authorization_details”, but we do want to say that the AS is allowed to (or
> even is supposed to) consider both “scope” and “authorization_details” when
> determining the resulting access for any given request that might have both.
> The guidance in 3.1 should probably say “the AS MUST consider all
> requirements present on a request” or something like that?“
> 
> Section 3 already states that the AS must consider scope and resource in
> addition to authorisation details. I suggest to drop that sentence entirely.

Works for me.

> >
> > ** Figure 15.  The text prior to this figure says that for "For our running
> example, this would look like this" indicating that this figure is similar to
> previous examples.  There is one key different - this is the first use of a
> "payment_initiator" type with the API URL prepended.
> >
> > ** Section 7.1. Typo. s/sub set/subset/
> >
> > ** Section 8.  What is the difference between this section and Section 5
> beyond this text explicitly stating the name of the error value
> (invalid_authorization_details).  I'd recommend stating the normative behavior
> twice; that is, why are both sections needed?
> 
> 5 and 8 define the error behaviour of different endpoint. But you are right, 
> the
> text is the same (with 5 being even more detailed). Suggest to remove the text
> in 8 with a reference to 5.

Works for me.

Thanks,
Roman

> best regards,
> Torsten.
> 
> >
> > ** Section 9.2.  Editorial.  There is some kind of rendering issues in the
> RFC7622 reference.  It reads "[!@RFC7662]".
> >
> > ** Section 11.2.
> >
> >   Products supporting this specification should provide the following
> >   basic functions:
> >
> > Should this section be more tightly scoped to AS behavior instead of a
> "products"?
> >
> > ** Section 11.2.
> >
> > Accept authorization_details parameter in authorization requests
> >      including basic syntax check  for compliance with this
> >      specification
> >
> > Why only "basic syntax checking"?  Perhaps "syntax checking"?
> >
> > ** Section 11.2
> >
> >   One option would be to have a mechanism allowing the registration of
> >   extension modules, each of them responsible for rendering the
> >   respective user consent and any transformation needed to provide the
> >   data needed to the resource server by way of structured access tokens
> >   or token introspection responses.
> >
> > I don't follow the flexibility being described here.  "One option ..." with
> respect to what?
> >
> > ** Section 11.3.  Could this section provide an example of what it would
> mean to use JSON schema ids in the type value.
> >
> > ** Section 12.  Please note that the Security Considerations of RFC6749,
> RFC7662, and RFC8414 apply.
> >
> > ** Section 13.
> >
> >   Implementers MUST design and use authorization details in a privacy-
> >   preserving manner.
> >
> > I completely agree with the principle, but this design guidance cannot be
> enforced without specifics.  I recommend s/MUST/must/.  The more specific
> text in this section can use the normative MUST statements.
> >
> > ** Section 13.
> >
> > Any sensitive personal data included in authorization details MUST be
> >   prevented from leaking, e.g., through referrer headers.
> >
> > Is "leaking" the same as being sent unencrypted?  Recommend being clear.
> >
> > ** Section 13.
> >
> > The AS SHOULD share this data with those parties on a "need to know"
> >   basis.
> >
> > Completely agree.  Consider ending this sentence with "... as determined by
> local policy", or the equivalent to make it clear that it will not be 
> document in
> this specification.
> >
> > Thanks,
> > Roman
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to