Hi Jaimandeep,

This sounds like a good discussion to continue on the mailing list, as I
don't think 5 minutes is enough to make any progress or come to any
conclusions.

Aaron



On Thu, Mar 16, 2023 at 11:10 AM Jaimandeep Singh <jaimandeep.phdcs21=
40nfsu.ac...@dmarc.ietf.org> wrote:

> Dear Rifaat,
>
> The main reason for proposing this topic was to gather the members'
> opinions on whether the current methodology for preserving the application
> state is adequate or there is a need to explore other alternatives. I don't
> have any supporting documents to share at this time. My intention was
> simply to open a discussion and assess the feasibility of alternative
> methodologies. The topic had come up during the mailing list discussions.
> As per my understanding, I would like to summarize the issue here:
>
> To ensure a better user experience, it is important to preserve the state
> from where the OAuth process was initiated. One way to convey this
> information is through the "state" parameter, which is passed from the
> client to the authorization server (AS) and back. The primary purpose of
> the "state" parameter is to mitigate Cross-Site Request Forgery (CSRF)
> attacks, and the developers may not appreciate its use for restoring the
> previous state of the application. The "state" parameter is impacted by all
> the three security principles i.e confidentiality, integrity and
> availability. The remediation measures in terms of confidentiality and
> integrity have been well brought out by the members in the mailing list by
> way of encryption or signing of "state" parameters. However, decryption and
> verification of the "state" parameter incurs performance penalties.
> Therefore, two questions arise:
> (a) Are there any other patterns that we can look at to address the
> concerns in terms of performance penalty?
> (b) Is there a need to provide clear guidelines on how to restore the
> previous state of the client application to ensure a seamless user
> experience in upcoming RFCs?
>
> Regards
> Jaimandeep Singh
>
>
>
> On Thu, Mar 16, 2023 at 5:39 PM Rifaat Shekh-Yusef <
> rifaat.s.i...@gmail.com> wrote:
>
>> Hi Jaimandeep,
>>
>> Can you elaborate on bullet 3? Do you have a document that discusses this
>> topic?
>>
>> Regards,
>>  Rifaat
>>
>>
>> On Thu, Mar 16, 2023 at 2:01 AM Jaimandeep Singh <
>> jaimandeep.phdc...@nfsu.ac.in> wrote:
>>
>>> Dear Rifaat,
>>>
>>> I would like to suggest following regarding the upcoming conference:
>>>
>>> 1. It would be very beneficial if the presenters could share the
>>> presentation materials and discussion points for each item on the agenda
>>> well in advance. This would enable us to go through the same and streamline
>>> the discussion. IMO when the points for discussion are presented at the
>>> last moment, it is difficult to make meaningful contributions.
>>>
>>> 2. Additionally, I suggest that we establish a hard cutoff time for each
>>> agenda item to ensure that we cover all the items on the agenda within the
>>> allocated time. In case of time overrun, we can continue the same in side
>>> discussions. In the last conference, it was observed that some agenda
>>> points ran over time, which meant that other important items on agenda were
>>> not addressed or did not get sufficient time.
>>>
>>> 3. If the members agree, a 5-minute agenda item can be added to discuss
>>> the use of the "state" parameter design pattern for preserving the current
>>> state and the impact it may have on performance of the oauth.
>>>
>>> Regards
>>> Jaimandeep Singh
>>>
>>> On Wed, 15 Mar, 2023, 7:34 pm Rifaat Shekh-Yusef, <
>>> rifaat.s.i...@gmail.com> wrote:
>>>
>>>> All,
>>>>
>>>> The following is the agenda for the official two sessions scheduled for
>>>> the OAuth WG:
>>>>
>>>> *Tuesday*
>>>>
>>>>    - *Chairs update –* Rifaat/Hannes (10 min)
>>>>    - *SD-JWT *– Kristina/Daniel – (20 min)
>>>>    - *Browser-based Apps* – Aaron (20 min)
>>>>    - *OAuth 2.1* – Aaron (20 min)
>>>>    - *Client/Trust Management *– Kristina/Torsten (20 min)
>>>>    - *Protected Resource Metadata *– Mike (15 min)
>>>>    - *Machine Identity *– Pieter (15 min)
>>>>
>>>>
>>>> *Friday*
>>>>
>>>>    - *JWT Embedded Tokens *– Rifaat/Dick (15 min)
>>>>    - *Cross Device Flow –* Pieter (15 min)
>>>>    - *Identity Chaining *– Rifaat/Pieter (20 min)
>>>>    - *Native Apps UX* – Aaron/Pieter (20 min)
>>>>    - *Authorization Server Discovery *– Aaron/Ben (20 min)
>>>>    - *PoP Security Architecture *– Nat (15 min)
>>>>    - *Power of Attorney (PoA) Grant Type *– Olov (15 min)
>>>>
>>>>
>>>> Please, let us know if you have any comments about the above agenda.
>>>>
>>>> Regards,
>>>>  Rifaat & Hannes
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>>
>
> --
> Regards and Best Wishes
> Jaimandeep Singh
> LinkedIn <http://www.linkedin.com/in/jaimandeep-singh-07834b1b7>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
-- 
---
Aaron Parecki
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to