Roman Danyliw has entered the following ballot position for
draft-ietf-regext-rdap-openid-25: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-regext-rdap-openid/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

** Section 3.1.3.  Lining up flow in Figure 2 and the associated text, it
appears that the RDAP client passes the access token to the RDAP server (Step
#10) which the RDAP server then passes it to the OpenID provider (Step #11). 
My understanding is that it is not considered good practice to pass access
tokens to external parties.  Is there a reason that RFC7667 (OAuth Token
Introspection) could not be used to allow the RS to query the AS about the
various claims?

** Section 3.1.5.2.  By design, this section seems to be defining a mechanism
outside of normal any audit capabilities which seems like it could have
security and operational implications.  Being able to track who is making
queries seems fundamental to operating the RDAP system.  Please document the
associated risks of being blind to certain queries.

** Section 5.1.2.  This workflow and even the fields in the farv1_deviceInfo
data structure seem to be very similar to the RFC8628/OAuth Device
Authorization Grant.  Did the WG consider using this flow instead of this
custom one?  Could it be used instead?

** Section 5.2.4.2.  The polling behavior described here is said to confirm to
the “polling function described in RFC 8628 [RFC8628]”.  However, this section
seems to specify normative behavior around query strings, that is, using an
HTTP GET method.  Section 3.1 of RFC8628 states that the protocol flow needs to
use a POST method.

** Section 11
   Additionally, the practices described in RFC
   8996 [RFC8996] MUST be followed when the Transport Layer Security
   (TLS) protocol is used.

Not using TLS 1.0 and 1.1 seems to narrow in scope.  Please use RFC 9325/BCP
195.

** Section 11.
   An RDAP server
   operator SHOULD develop policies for information disclosure to ensure
   that personally identifiable information is disclosed only to clients
   that are authorized to process that information.

Why is this not a MUST?  What are the circumstances where PII should be
disclosed without authorization?


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you to the authors for reaching out to the OAuth WG when this document
was first being drafted.

Thank you to Justin Richer for providing a timely review of this work from the
OAuth WG perspective.  See
https://mailarchive.ietf.org/arch/msg/oauth/33Ci5v7EHDLRC7pvvK85uarXutY/. 
Please review and respond to his feedback.  A number of ballot positions
presented here are due to his analysis.

I appreciate the patience of the WG given my deferral of this document to this
telechat.

** Section 3.1.3
   The RDAP server can then make identification, authorization, and
   access control decisions based on End-User identity information and
   local policies.  Note that OpenID Connect describes different process
   flows for other types of clients, such as script-based or command
   line clients.

Is RDAP intended to support additional flows beyond those described here?

** Section 3.1.3
   10.  The RDAP client sends queries that require user identification,
        authentication, and authorization to an RDAP server that include
        an Access Token in an HTTP "Authorization" header using the
        "Bearer" authentication scheme.

Please provide a normative reference to this authentication scheme.

** Section 3.1.5.1
   Communities of RDAP users and operators may wish to make and validate
   claims about a user's "need to know" when it comes to requesting
   access to a protected resource.
I don’t fully understand who will know what in the RDAP ecosystem.  Will the
identity provider be able to validate all of the allowable behaviors to
validate the values of the “rdap_allowed_purposes” claim?

** Section 3.1.5.1.  Editorial.  Move all of the guidance on registry
management to Section 9.3

** Section 3.1.5.2.  Not understanding the RDAP ecosystem and responding to the
example, this section seems to be providing a privileged mechanism for law
enforcement.  Are there other users?  Is this notion of “do not track” intended
(or currently implemented) as a general-purpose mechanism?

** Section 5.1.1.  Per the UserID value, is that created in some standardized
way for the RDAP ecosystem to allow interoperability?  OpenID uses a tuple of
issuer and subject.

** Section 11.
   OpenID
   Connect defines optional mechanisms for robust signing and encryption
   that can be used to provide data integrity and data confidentiality
   services as needed.

How would these services be used and for what purpose?

** Section 11
   As described in Section 3.1.4.2, the OAuth 2.0 Implicit Flow
   [RFC6749] is considered insecure and efforts are being made to
   deprecate the flow.  It SHOULD NOT be used.

Since this is “green field” design, why not “MUST NOT”?

** Section 11.  Would referencing draft-ietf-oauth-security-topics-23 for
additional SecCon be useful?



_______________________________________________
regext mailing list
regext@ietf.org
https://www.ietf.org/mailman/listinfo/regext

Reply via email to