Hi Rohan, thanks for your feedback. Answers are inline:

On 06.02.25 02:21, Rohan Mahy wrote:
Hi,
I support the overall goals of this document. I do *not* think the document was ready for WGLC; at minimum there are still plenty of TBDs and TODOs in the text. Below are some comments:
We do not have any TODOs in the text. We have TBD in the text for values that will be defined by IANA registry which is standard procedure in other drafts as well.

1. I would prefer we make the document standards track instead of informational.
This is correct, this draft has always been planned for the standards track, we will fix the metadata to accompany for that.

2. You have to read through to section 6.2 to see how a verifier determines the index of a token it receives in the status value array. Please add one sentence in the Introduction saying that the index is in the referenced token. You could even update the diagram to reflect this.
This in incorrect, the introduction currently contains the following text: "Each Referenced Token is allocated an index during issuance that represents its position within this bit array. The value of the bit(s) at this index corresponds to the Referenced Token's status." We like the other idea, we will investigate the idea to add this to the diagram.

3. The document uses status_list (JSON object) and StatusList (CBOR map) to refer to the map, but Status List seems to be used to refer to both the compressed byte string (in Section 5) and the uncompressed byte array of status values (in Section 4 step 2, and Section 4.1 2nd sentence).
This is correct, we will separate, the parts of section 4 that talk about the the uncompressed byte array into its own subsection and not use the wording Status List for this. Otherwise, through out the rest of the document, Status List refers to the compressed byte array as defined in the terminology.

4. CRLs (Certificate Revocation Lists) are a list of the serial numbers of every invalidated certificate (with a reason code). While a compressed 1 or 2 bit status per token tends to be very compact per issued token, it would be useful for the draft to show an analysis of what percentage of issued tokens would need to be invalid before a status list would be smaller than a CRL-like structure that only references invalid indexes in a (possibly compressed) ordered list (assuming randomly distributed invalidations).

I have not seen performance or comparative measures like this in many other drafts, we have made analysis and performance measures for our presentations at IEFT, for example here: https://docs.google.com/presentation/d/1m59OC8uKM4nZ14aH2TM9r2mxEhOiP-G5uqzAZ7oOAUk/edit#slide=id.g2318b641e56_0_23

The comparison with the CRL depends on a bunch of parameters and assumptions, so it's not that easy.

What does the working group think about including performance metrics itself in the draft?


5. There is no discussion of maximum or recommended limits to the size of a Status List. Starting ambitiously, idx is a JSON Number, so we should probably follow the recommendation in https://datatracker.ietf.org/doc/html/rfc8259#section-6 and say it MUST NOT be larger than (2^53) - 1, but a 1-bit status list with that many indexes would be 10TB with > 10:1 compression. I think the document needs to define a reasonable maximum size, and could allow profiles to make that smaller.
I haven't seen an guidance like this in CRL draft either and I believe that our assumptions about reasonable sizes in 2025 will not hold in 2035, so I'm hesitant to add this kind of guidance.

6. I think it is a mistake to compress the entire status_list (JSON object) or StatusList (CBOR map). Instead it would be better to compress just the status value array (the "lst" field).

  * Naive implementations might try to decompress the entire
    object/map to get the bit field before trying to read the array.
  * If you make the "lst" field an uncompressed byte string in JSON,
    it will need to be base64url encoded *before* you compress it.
    Then the status_list object would need to be base64url encoded
    again. That's wasteful and accomplishes nothing as far as I can tell.
  * Because JSON maps and CBOR maps are encoded differently,
    compressing the object/map will make it hard to use a status list
    across token encoding environments. If only the contents of the
    "lst" field was compressed, it would allow an issuer to generate
    JWT/CWT pairs with the same index and use one status list between
    them. (both would be invalidated together).

I think this is a misunderstanding. The Status List from Section 4 is already compressed in the Step 3. Section 4.1 about Status List in JSON Format has an "lst" field that then contains the compressed byte array, which must however be base64-encoded as JSON does not support. byte array. Section 4.2 about Status List in CBOR Format has an "lst" field that then contains the compressed byte array directly. I don't see how we can be any more space-efficient than this. Therefore, JSON and CBOR structures would contain the same Status List byte array.

Furthermore, we have test vectors in the Appendix, so that implementations can verify correctness.

7. I am surprised by some details of the CBOR encoding:

  * Traditionally, CWT maps have integer keys for comment values. Why
    not replace "bits" with 1, and "lst" with 2?
  * The document registers CWT claim keys 65534 and 65535. Why not ask
    for unused numbers in the 24-256 range?
  * It wasn't immediately clear from the text that the status list is
    a bstr encoding of the compressed serialized map. If we implement
    my recommendation in #6, this problem goes away.

- We have talked to people from the CBOR world and apparently this is what people do today, e.g. in the ISO mdoc world, but we are open for discussions here. - We have talked to Mike Jones about this, who is one of the designated experts for CWT and this was his recommendation - We have the text: "|lst|: REQUIRED. Byte string (Major Type 2) that contains the Status List as specified in Section 4 <https://drafts.oauth.net/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html#status-list>." which clearly references bstr.

8. There should be a CDDL snippet for the CBOR. I would be happy to provide one once points 6 and 7 are addressed.
If CDDL is requested and helps the understanding, then we can add this to the draft.

9. I think it will be important for implementers to have some advice on constructing a logical scope for Referenced Tokens to be interoperable, so that issuers have good practices for recycling indexes. For example if all the tokens with the same status list URL have roughly the same duration of validity, cycling through URL paths would eventually allow reuse after all previously referenced tokens had expired. Is it ok to generate a Status List for 100 tokens, then generate a new Status List with the same "referenced token scope" that covers 200 tokens (including the first 100 tokens)? If so, that would be good to say.

We have some guidance here: https://drafts.oauth.net/draft-ietf-oauth-status-list/draft-ietf-oauth-status-list.html#name-referenced-token-lifecycle saying "The lifetime of a Status List Token depends on the lifetime of its Referenced Tokens. Once all Referenced Tokens are expired, the Issuer may stop serving the Status List Token." We did not want to encourage re-usage of indices, as this may introduce security issues.

10. NIT: Section 6.3 refers to status_list but I think you mean StatusList
The CWT status structure says: "Each data item in the |Status| CBOR structure comprises a key-value pair, where the key must be a CBOR text string (Major Type 3) specifying the identifier of the status mechanism and the corresponding value defines its contents. This specification defines the following data items:", so indeed "status_list" refers to a CBOR text string.

Thanks,
-rohan

Thanks for your feedback. Best regards,

Paul+Christian



On Thu, Jan 2, 2025 at 5:53 AM Rifaat Shekh-Yusef <rifaat.s.i...@gmail.com> wrote:

    All,

    This is a WG Last Call for the *Token Status List *document.
    https://datatracker.ietf.org/doc/draft-ietf-oauth-status-list/

    Please, review this document and reply on the mailing list if you
    have any comments or concerns, by *Jan 17th*.
    Note that this document will be discussed during the OAuth WG
    *interim* on *Jan 13th*.

    Regards,
      Rifaat & Hannes

    _______________________________________________
    OAuth mailing list -- oauth@ietf.org
    To unsubscribe send an email to oauth-le...@ietf.org


_______________________________________________
OAuth mailing list --oauth@ietf.org
To unsubscribe send an email tooauth-le...@ietf.org
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to