Hi Scott,

Il 2022-10-21 15:46 Hollenbeck, Scott ha scritto:
-----Original Message-----
From: Pawel Kowalik <kowa...@denic.de>
Sent: Friday, October 21, 2022 5:18 AM
To: Hollenbeck, Scott <shollenb...@verisign.com>; regext@ietf.org
Subject: [EXTERNAL] Re: [regext] I-D Action: draft-ietf-regext-rdap-openid-
18.txt

Caution: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is
safe.

Hi Scott,

Am 20.10.22 um 21:02 schrieb Hollenbeck, Scott:
>> Am 19.10.22 um 14:13 schrieb Hollenbeck, Scott:
>>> [SAH] If the PII data you're referring to is what's included in the
>>> userClaims, this might not be an issue if the claims aren't
>>> returned, correct?
>> Correct
> [SAH] Does anyone object to removing the "userClaims" object from the
> "farv1_session" data structure?

[PK] IMHO it's not the best idea to remove userClaims completely.

PII claims can be useful for UX, there are also non PII claims which can be returned, like the Specialized Claims for RDAP, which won't be possible at all if
we remove userClaims.
The provisions of making userClaims optional, under the policy of the RDAP server and adding security considerations are in my eyes the right measures to
address the concerns.

We also didn't complete the discussion about the web clients, where we can also minimise the risks by adding a possibility of confidential clients if
necessary.

[SAH] OK, if we keep the "userClaims" I probably need to add text to
the Security Considerations section. How about this:

"Some of the responses described in this specification return
information to a client from an RDAP server that is intended to help
the client match responses to queries and manage sessions. Some of
that information, such as the "userClaims" described in Section 4.1.1,
can be personally identifiable and considered sensitive if disclosed
to unauthorized parties. An RDAP server operator SHOULD develop
policies for information disclosure to ensure that personally
identifiable information is disclosed only to clients that are
authorized to process that information."

[ML] Sorry but, based on the last sentence, it appears to be unclear to me how clients are identified by the server as authorized clients and leaving such an aspect unspecified purposefully could open the way to unsecure implementations.

Have two possible solution in mind:

- if it is the server that decides on its own whether a client is authorized or not, think that the client should be identified in some way. I personally reject this solution due to the security implications connected with clients issuing their credentials in clear as GET parameters of the /farv1_login request.

- otherwise, if a client is authorized by the end user, think text should clarify that consent for disclosing claims is given explicitly by the end user.

Anyway, a server should manage errors due to unauthorized clients.

Best,
Mario



Scott
_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to