Adding the OAuth WG to this thread.

Regards,
 Rifaat


On Wed, May 15, 2024 at 7:52 AM Carl Wallace <c...@redhoundsoftware.com>
wrote:

> Here're a few questions/comments from a first read of
> draft-ietf-oauth-status-list. Overall, the approach looks good to me.
>
>
>
> Should at least one of ttl and exp be required? Why is ttl not listed for
> CBOR? Are both mechanisms needed?
>
>
>
> It mahy be worth including some words on using the uri field to partition
> status lists based on token lifetime so status lists don't linger. The uri
> field is similar to partitioning using the IDP/CDP mechanism in CRLs, so
> any partitioning scheme could work, but mentioning the concept may be
> helpful.
>
>
>
> Should there be a POST option for requesting a status list that provides
> for freshness via a nonce? If so, does this cause a need for delegation so
> a token signing key need not be online (i.e., maybe some identifier in the
> status claim in the referenced token)? This would make GET requests
> analogous to partitioned CRLs and POST requests analogous to OCSP with a
> nonce, with the extra benefit that both use the same format.
>
>
>
> The mechanism is simple, which is good, but the lack of a time value
> corresponding to revocation time may limit applicability. If JWTs/CWTs
> replace certificates where signature validation is well after generation,
> is a revocation mechanism needed that supports similar support for grace
> periods, verification relative to times in the past, etc? It may be worth
> noting cases where this mechanism may not be a good fit for such use cases
> even if not addressing. A POST request that accepted a time value may serve
> this purpose with no change to the status list definition, i.e., just
> return the response relative to the requested time instead of current.
>
>
>
> *From: *Spasm <spasm-boun...@ietf.org> on behalf of "Tschofenig, Hannes"
> <hannes.tschofenig=40siemens....@dmarc.ietf.org>
> *Date: *Friday, May 3, 2024 at 3:28 AM
> *To: *"sp...@ietf.org" <sp...@ietf.org>
> *Cc: *Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com>
> *Subject: *[lamps] Revocation and OAuth
>
>
>
> Hi all,
>
>
>
> At the last two IETF meetings I mentioned that the OAuth working group is
> looking into various “token” revocation mechanisms and there is a strong
> similarity with the work done in the PKIX environment. See also my HotRFC
> presentation at IETF118: Can we improve certificate/JWT/CWT revocation?
> (ietf.org)
> <https://datatracker.ietf.org/meeting/118/materials/slides-118-hotrfc-sessa-can-we-improve-certificatejwtcwt-revocation-00>
>
>
>
> Rifaat and I want to make sure that we take the experience from LAMPS into
> account. Hence, we have scheduled a dedicated interim meeting on the topic
> of revocation, see
>
> [OAUTH-WG] Invitation: OAuth WG Virtual Interim - Revocation Drafts @ Tue
> Jun 11, 2024 12pm - 1pm (EDT) (oauth@ietf.org)
>
>
>
> It would be great if some of you could join the interim meeting.
>
>
>
> Ciao
> Hannes
>
>
>
> _______________________________________________ Spasm mailing list
> sp...@ietf.org https://www.ietf.org/mailman/listinfo/spasm
>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to