Hi Roman,

Thanks for your feedback, I just released a new version addressing your comments!

-Daniel

Am 08.02.24 um 14:54 schrieb Roman Danyliw:

Hi!

I need to apologize here.  I didn’t catch this email and was watching for revised I-D indicator in the Datatracker.  Thanks for producing this revision over the winter break.  The detailed explanations on the WG deliberations on the specific guidance I asked about was very helpful.  Likewise, the new introductory text finds the right balance in addressing how this document updates the others.

Practically, the revised draft in github addresses almost all of my feedback.  A few minor things from the previous thread:

*From:* OAuth <oauth-boun...@ietf.org> *On Behalf Of * Daniel Fett
*Sent:* Thursday, December 28, 2023 8:35 AM
*To:* oauth@ietf.org
*Subject:* Re: [OAUTH-WG] AD Review of draft-ietf-oauth-security-topics-24


        

*Warning:*External Sender - do not click links or open attachments unless you recognize the sender and know the content is safe.

Hi Roman,

thanks again for your feedback!

I have a few open questions below, but already incorporated most of your (and Hannes) feedback in the editor's copy:

- https://oauthstuff.github.io/draft-ietf-oauth-security-topics/draft-ietf-oauth-security-topics.html

- Diff to published version: https://author-tools.ietf.org/api/iddiff?doc_1=draft-ietf-oauth-security-topics&url_2=https://oauthstuff.github.io/draft-ietf-oauth-security-topics/draft-ietf-oauth-security-topics.txt <https://author-tools.ietf.org/api/iddiff?doc_1=draft-ietf-oauth-security-topics&url_2=https://oauthstuff.github.io/draft-ietf-oauth-security-topics/draft-ietf-oauth-security-topics.txt>

I plan to publish the next version once we have resolved the discussion points below.

Also looking forward to feedback from the list and the co-editors!

-Daniel

Am 19.12.23 um 00:08 schrieb Roman Danyliw:

    ** Section 2.2.

        The privileges associated with an access token SHOULD be restricted

        to the minimum required for the particular application or use case.

    Under what circumstances should access tokens not be restricted?  Can this 
be documented?

Due to the variety in architectures, I guess this would mostly boil down to performance reasons and architectural limitations (resource server or exact privileges are not known at the time of authorization).

I suggest that we add a sentence to discuss this to Section 4.10 <https://www.ietf.org/archive/id/draft-ietf-oauth-security-topics-24.html#section-4.10>.

[Roman] Please do.  Thanks.

    ** Section 2.6.

        It is RECOMMENDED to use end-to-end TLS between the client and the

        resource server.  If TLS traffic needs to be terminated at an

        intermediary, refer to Section 4.13 for further security advice.

    Is there further TLS guidance to provide?  Could BCP 195 be used (RFC9325)?

I would be fine with adding "according to BCP 195" in the first sentence. What do you think?

    [Roman] That makes sense to me.

    ** Section 4.18.2.  Formally cite that these are Javascript (?) examples.

I added that these are JavaScript examples. Do you think we need a formal reference to ECMAScript? I don't think this would be very helpful.

[Roman] The compromise position would be to call it pseudocode and make an editorial distinction that this is an example.

OLD

Clients MUST utilize exact string matching to

   compare the initiator origin of an in-browser message with the

authorization server origin:

window.addEventListener("message", (e) => {

     // validate exact AS origin

     if (e.origin === https://honest.as.example) {

       // process e.data.code and e.data.state

     }

   })

NEW

Clients MUST utilize exact string matching to compare the initiator origin of an in-browser message with the authorization server origin.  For example, in Javascript-like pseudo code, this comparison could look as follows:

window.addEventListener("message", (e) => {

     // validate exact AS origin

     if (e.origin === https://honest.as.example) {

       // process e.data.code and e.data.state

     }

   })

Regards,

Roman
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to