[OAUTH-WG] Comments on draft-hardt-oauth-distributed

2017-11-14 Thread Manger, James
It is good to see this RESTful authorization server (AS) discovery mechanism. It takes me back to 2010 & 2011 when this idea was also discussed. The "iss" value in the WWW-Authenticate response header should presumably be an AS's real "iss" value, not an AS's token endpoint address. So H

Re: [OAUTH-WG] Fwd: I-D Action: draft-ietf-oauth-security-topics-04.txt

2017-11-14 Thread Nat Sakimura
Thanks, Torsten. In 4.11, you can probably add client_secret and code phishing explained in https://nat.sakimura.org/2016/01/22/code-phishing-attack-on-oauth-2-0-rfc6749/ . I do not like the mitigation strategy there at all, though. Now that we have MTLS draft, using that is much better. The curr

Re: [OAUTH-WG] cert spoofing in mtls & short-lived certs

2017-11-14 Thread Leif Johansson
On 2017-11-14 10:27, Brian Campbell wrote: > The expectation/assumption is that the SubjectDN would be a stable > identifier through re-issuance of certificates, regardless of whether > they be short or long term. We've had basically this as a product > feature for years and use of the SubjectDN

[OAUTH-WG] Fwd: I-D Action: draft-ietf-oauth-security-topics-04.txt

2017-11-14 Thread Torsten Lodderstedt
Hi all, I just published revision -04. Changes: Added best practices on Token Leakage prevention Restructured document for better readability kind regards, Torsten. > Anfang der weitergeleiteten Nachricht: > > Von: internet-dra...@ietf.org > Betreff: [OAUTH-WG] I-D Action: draft-ietf-oauth-s

[OAUTH-WG] I-D Action: draft-ietf-oauth-security-topics-04.txt

2017-11-14 Thread internet-drafts
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Web Authorization Protocol WG of the IETF. Title : OAuth Security Topics Authors : Torsten Lodderstedt John Bradley

Re: [OAUTH-WG] Question on REQUIRED metadata in https://tools.ietf.org/html/draft-ietf-oauth-discovery-07

2017-11-14 Thread Dick Hardt
Thanks for the quick response Mike. Good to know I understand specs once in awhile. /Dick On Tue, Nov 14, 2017 at 5:14 PM, Mike Jones wrote: > Good catch. The authorization_endpoint should only be required if flows > are supported that need it. Our old favorite, the Resource Owner Password >

Re: [OAUTH-WG] cert spoofing in mtls & short-lived certs

2017-11-14 Thread Brian Campbell
The expectation/assumption is that the SubjectDN would be a stable identifier through re-issuance of certificates, regardless of whether they be short or long term. We've had basically this as a product feature for years and use of the SubjectDN as the identifier hasn't been an issue. And it's not

Re: [OAUTH-WG] Question on REQUIRED metadata in https://tools.ietf.org/html/draft-ietf-oauth-discovery-07

2017-11-14 Thread Mike Jones
Good catch. The authorization_endpoint should only be required if flows are supported that need it. Our old favorite, the Resource Owner Password Credentials flow doesn’t use it, correct? Likewise, the Client Credentials flow doesn’t. I’ll plan to make appropriate updates in -08.

Re: [OAUTH-WG] JSON Web Token Best Current Practices draft describing Explicit Typing

2017-11-14 Thread Brian Campbell
Resurrecting the thread that had a request for more guidance around how to use the explicit typing with nested JWTs. As discussed/requested during the WG meeting. On Mon, Jul 17, 2017 at 5:55 PM, Mike Jones wrote: > Good point. I’d had that thought as well at one point but failed to > express i

[OAUTH-WG] Question on REQUIRED metadata in https://tools.ietf.org/html/draft-ietf-oauth-discovery-07

2017-11-14 Thread Dick Hardt
I was reviewing https://tools.ietf.org/html/draft-ietf-oauth-discovery-07 and noticed that in https://tools.ietf.org/html/draft-ietf-oauth-discovery-07#section-2 that authorization_endpoint is REQUIRED. I am working on deployments that are two-legged OAuth where there is no authorization_endpoint

[OAUTH-WG] cert spoofing in mtls & short-lived certs

2017-11-14 Thread Leif Johansson
So I reviewed the security considerations text which basically sais that the server can avoid being spoofed by managing its set of trust anchors. The text is better than nothing. However this lead me to ask another question about the use of SubjectDN as an identifier for the subject in client met