Hi!

I appreciate the updated in -13 and -14.  Most of the AD feedback has been 
addressed there.  Combing through the multiple sub-threads, I've pruned to text 
to cover what is the residual feedback.  See below.

To keep this document moving, I'm going to start IETF LC on it.  Please address 
this feedback concurrently.

> > -----Original Message-----
> > From: Justin Richer <jric...@mit.edu>
> > Sent: Thursday, September 15, 2022 11:20 AM
> > To: Roman Danyliw <r...@cert.org>
> > Cc: oauth@ietf.org
> > Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-rar-12
> >
> > Hi Roman, some responses inline.
> >
> > > On Sep 14, 2022, at 6:30 PM, Roman Danyliw <r...@cert.org> wrote:

[snip]

> > > ** Section 6.1
> > >
> > >  However, when comparing a new request to an existing request,
> > >   authorization servers can use the same processing techniques as used
> > >   in granting the request in the first place to determine if a resource
> > >   owner needs to authorize the request.
> > >
> > > Why is it possible to assess two arbitrary requests in this case to
> > > determine "if
> > a resource owner needs to authorize the request", but the prior
> > paragraph explicitly calls out that comparing two arbitrary requests
> > is not feasible?  To me is seems like comparing two requests to
> > understand if more or less permissions are being requested is
> > equivalent to determining if a new request exceed the current request to
> determine if going back to the resource owner is needed.
> > >
> >
> > It might be possible to do such a comparison in a specific case, but
> > we can’t add logic in the general case. In OAuth, scopes are supposed
> > to be purely additive, so if you have another scope it’s for “more”
> > things. We know in practice that that’s not always how it works.
> > Things get much more complex with RAR because you could have an object
> > with :more: fields in it that makes things more :strict: by the
> > presence of those fields. That’s all going to be up to the “type”
> > definition though, so if you understand the “type” definition you
> > could do a comparison based on that. To me the text is clear, can you 
> > suggest
> how we could clarify this?
> 
> OLD 1
> Since the nature of an authorization details request
>    is based solely on the API or APIs that it is describing, there is
>    not a simple means of comparing any two arbitrary authorization
>    details requests.
> 
> NEW 1
> Since the semantics of the fields in the authorization details result will be
> implementation specific to a given API or set of APIs, there is a no 
> standardized
> mechanism to compare two arbitrary authorization detail requests.
> 
> OLD 2
>    However, when comparing a new request to an existing request,
> 
> NEW 2
> 
> When comparing a new request to an existing request, ...

[snip]


> > > ** Section 11.2.
> > >
> > > Accept authorization_details parameter in authorization requests
> > >      including basic syntax check  for compliance with this
> > >      specification
> > >
> > > Why only "basic syntax checking"?  Perhaps "syntax checking"?
> >
> > I’m not positive, but I think the guidance here is meant for “basic”
> > to mean more like “make sure it’s a JSON object and that it has a type
> > field” as opposed to “check the type field’s value and run it against a JSON
> Schema definition”.
> 
> I don't think this is worth unpacking and would just recommend:
> 
> OLD
> *  Accept authorization_details parameter in authorization requests
>       including basic syntax check for compliance with this
>       specification
> 
> NEW
> *  Accept authorization_details parameter in authorization requests
>       Conformant with this this specification

Thanks,
Roman
 
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to