Andy Newton has entered the following ballot position for
draft-ietf-oauth-browser-based-apps-24: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-oauth-browser-based-apps/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

# Andy Newton, ART AD, comments for draft-ietf-oauth-browser-based-apps-24
CC @anewton1998

* line numbers:
  -
  
https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-oauth-browser-based-apps-24.txt&submitcheck=True

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Discuss

Many thanks to authors and working group for putting this document together.
And thanks to all the reviewers who have provided very good feedback.

### Update RFC 9700

166        Many of these recommendations are derived from the Best Current
167        Practice for OAuth 2.0 Security [RFC9700], as browser-based
168        applications are expected to follow those recommendations as well.
169        This document expands on and further restricts various
170        recommendations given in [RFC9700].

Given the above text which states that it further restricts RFC 9700,
should this document be listed as updating RFC 9700?

UPDATE: based on the conversation of the telechat on 24 April this is no
longer a discuss item. This document does not need to update RFC 9700.

### Consistency of Terms

188        "Browser-based application":  An application that is dynamically
189           downloaded and executed in a web browser, usually written in
190           JavaScript.  Also sometimes referred to as a "single-page
191           application", or "SPA".

This draft introduces the term "Browser-based application" which is used
in some places, but it also uses the term "Javascript application" in
many more places. Here is an example where the two terms are used
together and to mean the same thing (I think).

1436       The token-mediating backend counters the first two attack scenarios
1437       by not exposing the refresh token to the browser-based application.
1438       Even when the attacker gains full control over the JavaScript
1439       application, there are simply no refresh tokens to be stolen.

Is a JavaScript application the same thing as a browser-based application
in this document? I also noticed a few places where the term SPA or single
page application were used. If these are all the same term, can one term
be used instead of many? And if they are separate terms, can their definitions
all be given even if quoting from a reference?

1737       In this scenario, the application sends JavaScript-based requests to
1738       the authorization server and the resource server.  Given the nature

What is a Javascript-based request? Is this a request for data in JSON format
or is it a request being made by code of the JavaScript application (or
browser-based application)?

### BFF as an HTTP Proxy

>From the description of the BFF with respect to the browser-based application
and the resource server, it appears to act as an HTTP proxy as defined in
Section 3.7 of RFC 9110. Should this document make note of this
and reference the message forwarding requirements of Section 7.6 in RFC 9110?


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

## Comments

### BFF Operational Considerations

As the BFF is forwarding/proxying all requests to the resource server,
I wonder if there are any operational issues to consider. If a resource
server is rate limiting requests based on IP addresses, might it start
blocking requests as it would appear many users are originating from
one or a few sources?


## Nits

### hard drive

905        cookies are never written to the user's hard drive in plaintext

Most users today probably do not use equipment with hard drives.
This is probably better said as "local, persistent storage".



_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to