Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Vittorio Bertocci
Rotation can be used to detect leakage, right? Client credentials offer more guarantees, but unless you are using private JWTs with a non exportable certificate as client cred, a classic client secret _could_ technically leak. Having rotation would alert you if someone got a hold on those. Admitted

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Pedro Igor Silva
I don't but people using our AS. As I mentioned, rotation for such clients does not make sense but we had to deal with it. I just wanted to bring an example of how rotation can't be added without a significant impact on development and runtime experiences (as mentioned by Vittorio) if considered f

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Brian Campbell
On Thu, Mar 12, 2020 at 3:03 PM Aaron Parecki wrote: > > The Security BCP recommends S256. > > Is a recommendation enough to change the default? No. How would that work in practice anyway? If no code_challenge_method was present, then you'd need to know which version of OAuth is being used (ho

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Brian Campbell
I agree that the language around sender constraining refresh tokens and confidential client could/should be clearer. I did try and discuss the idea that that such a refresh token is constrained by virtue of being bound to the client and the client having to authenticate to use it in https://www.rfc

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Aaron Parecki
> The Security BCP recommends S256. Is a recommendation enough to change the default? That's definitely normative changes from PKCE. I could be convinced either way, but it would be the first place that 2.1 deviates from the combination of the RFCs and BCPs. Aaron Parecki aaronparecki.com @a

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Torsten Lodderstedt
> Am 12.03.2020 um 21:59 schrieb Aaron Parecki : > >  >> >> In regards to `code_challenge_method` parameter in authorization requests.. >> Wouldn't make more sense to have the default value as `S256` based on the >> statement in Section `4.1.1.2. Client Creates the PKCE Code Challenge` that

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Aaron Parecki
> In regards to `code_challenge_method` parameter in authorization requests. > Wouldn't make more sense to have the default value as `S256` based on the > statement in Section `4.1.1.2. Client Creates the PKCE Code Challenge` that > says that `S256` is MTI on the server? > So you have `plain` a

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Torsten Lodderstedt
Then why are you rotating refresh tokens? > Am 12.03.2020 um 20:48 schrieb Pedro Igor Silva : > >  > A confidential client, as per the `web application` definition in Section > `2.1. Client Types`. > >> On Thu, Mar 12, 2020 at 4:39 PM Torsten Lodderstedt >> wrote: >> Is that a public clien

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Pedro Igor Silva
A confidential client, as per the `web application` definition in Section `2.1. Client Types`. On Thu, Mar 12, 2020 at 4:39 PM Torsten Lodderstedt wrote: > Is that a public client? > > Am 12.03.2020 um 20:32 schrieb Pedro Igor Silva : > >  > I agree with you and recently, we had to deal with a

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Torsten Lodderstedt
Is that a public client? > Am 12.03.2020 um 20:32 schrieb Pedro Igor Silva : > >  > I agree with you and recently, we had to deal with an issue where a `web > application` using rotation (as defined by the draft) was having issues to > refresh tokens due to multiple concurrent requests at the

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Pedro Igor Silva
I agree with you and recently, we had to deal with an issue where a `web application` using rotation (as defined by the draft) was having issues to refresh tokens due to multiple concurrent requests at the moment a token is about to expire or already expired. We had to add some controls to deal wit

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Pedro Igor Craveiro e Silva
Hi Aaron, In regards to `code_challenge_method` parameter in authorization requests. Wouldn't make more sense to have the default value as `S256` based on the statement in Section `4.1.1.2. Client Creates the PKCE Code Challenge` that says that `S256` is MTI on the server? So you have `plain` as

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Vittorio Bertocci
Thanks for the clarification, Torsten. I believe it's the first time I see use of client credentials positioned as sender constraint; if the intent is saying that confidential clients should use their credentials when redeeming refresh tokens, I am of course in agreement but I think the language sh

Re: [OAUTH-WG] [EXTERNAL] Re: First Draft of OAuth 2.1

2020-03-12 Thread Torsten Lodderstedt
I think we need to change wording. Sender constraining for confidential client and refresh tokens does not require any signature. It’s client authentication + checking the client id matches. I don’t see an issue with this. > Am 12.03.2020 um 19:36 schrieb Mike Jones > : > >  > +1 on sender co

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread George Fletcher
I also am in favor of not requiring "sender constraint" as a MUST. SHOULD or RECOMMENDED is fine. Many websites are NOT Single-Page-Apps and as such DPOP doesn't work for those environments. Converting all web based environments to SPAs so not viable. Thanks, George On 3/12/20 2:28 PM, Vittor

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Torsten Lodderstedt
Hi, sender constraining refresh tokens for confidential client means client authentication + check the binding of the refresh token with the respective client id. I don’t think this is new as RFC6759 already required ASs to check this binding. Assuming backends are generally confidential client

Re: [OAUTH-WG] [EXTERNAL] Re: First Draft of OAuth 2.1

2020-03-12 Thread Mike Jones
+1 on sender constraints being RECOMMENDED but not REQUIRED. Different applications have different risk profiles. We should enable people to make reasonable choices for their use cases. Remember that OAuth 1.0 was rejected by the marketplace because implementing the sender-constraint mechanis

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Vittorio Bertocci
damnit, i hit enter too soon. Hey guys, thanks for putting this together. I am concerned with the real world impact of imposing sender constraint | rotation as a MUST on refresh tokens in every scenario. Sender constraint isn't immediately actionable - we just had the discussion for dPOP, hence I

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Vittorio Bertocci
Hey guys, thanks for putting this together. I am concerned with the real world impact of imposing sender constraint | rotation as a MUST on refresh tokens in every scenario. Sender constraint isn't immediately actionable - we just had the discussion for dPOP, hence I won't go in the details here. R

Re: [OAUTH-WG] OAuth 2.1 - drop implicit flow?

2020-03-12 Thread Vittorio Bertocci
Sorry for the delay here. >From the formal perspective, Torsten's language works for me as well. Thanks for taking the feedback into account. I still worry that without an explicit reference to OIDC implicit+form_post, I will have the conversation "but can we still do this in OIDC now that implici

Re: [OAUTH-WG] JWT Secured Authorization Request (JAR) vs OIDC request object

2020-03-12 Thread George Fletcher
I'm a +1 for adding client_id back as well On 3/12/20 11:31 AM, Brian Campbell wrote: +1 (again) that `client_id` should be allowed/required as a query parameter outside the request object JWT or URI and that its value has to be the same as within the request object. On Thu, Mar 12, 2020 at 8:2

Re: [OAUTH-WG] OAuth Digest, Vol 137, Issue 41

2020-03-12 Thread Rifaat Shekh-Yusef
So looks like a refresh token is allowed for this endpoint. >> > > >> >> > > >> >> > > >> Bill Jung >> > > >> Manager, Response Engineering >> > > >> bj...@pingidentity.com >> > > >> w: +1 60

Re: [OAUTH-WG] OAuth Digest, Vol 137, Issue 41

2020-03-12 Thread isaac ajonibode
gt; > On Mar 1, 2020, at 10:11 PM, Andrii Deinega > > wrote: > > > > > > How would the authorization server know who actually uses the > > > introspection endpoint assuming that a protected resource and a client > > &g

Re: [OAUTH-WG] JWT Secured Authorization Request (JAR) vs OIDC request object

2020-03-12 Thread Brian Campbell
+1 (again) that `client_id` should be allowed/required as a query parameter outside the request object JWT or URI and that its value has to be the same as within the request object. On Thu, Mar 12, 2020 at 8:20 AM Joseph Heenan wrote: > I agree with that too. > > Joseph > > On 12 Mar 2020, at 14

Re: [OAUTH-WG] Fwd: [EXTERNAL] Re: JWT Secured Authorization Request (JAR) vs OIDC request object

2020-03-12 Thread Filip Skokan
Yes, that sounds good to me. Best, Filip On Tue, 25 Feb 2020 at 03:18, Nat Sakimura wrote: > So, where should we take it to? > Just add back client_id as it used to be? > > On Fri, Jan 24, 2020 at 6:55 AM John Bradley wrote: > >> >> -- Forwarded message - >> From: John Bradley

Re: [OAUTH-WG] OAuth Digest, Vol 137, Issue 4

2020-03-12 Thread isaac ajonibode
Please unsubscribe me from your mailing list Isaac O.Ajonibode C.Director CBMC Nigeria cbmcnigeria2...@gmail.com www.cbmcint.com/Nigeria +2347087552127 FOUNDER/CEO AJOFOLU VENTURES INT'L LTD ajofoluventu...@gmail.com +2348164286235 2 Corinthians 5:20 On Mon, 2 Mar 2020, 06:33 , wrote: > Send

Re: [OAUTH-WG] JWT Secured Authorization Request (JAR) vs OIDC request object

2020-03-12 Thread Joseph Heenan
I agree with that too. Joseph > On 12 Mar 2020, at 14:18, Mike Jones > wrote: > > I agree that we should restore the client_id functionality. Thanks for > moving this forward! > >-- Mike > > From: OAuth mailto:oauth-boun...@ietf.org

Re: [OAUTH-WG] JWT Secured Authorization Request (JAR) vs OIDC request object

2020-03-12 Thread Mike Jones
I agree that we should restore the client_id functionality. Thanks for moving this forward! -- Mike From: OAuth On Behalf Of Nat Sakimura Sent: Monday, February 24, 2020 6:18 PM To: John Bradley Cc: oauth Subject: Re: [OAUTH-WG] Fwd: [EX

Re: [OAUTH-WG] First Draft of OAuth 2.1

2020-03-12 Thread Peck, Michael A
This looks like a great initial draft, and I hope to see it move forward. Some comments so far: Section 1.6: “At the time of this writing” is duplicated. Section 3.1.2.1 (and possibly other sections such as 1.6 / 2.3.1 / 3.1 / 3.2 that mandate TLS): Section 3.1.2.1 currently retains this langu

Re: [OAUTH-WG] Small error in OAuth BCP and new 2.1 draft...

2020-03-12 Thread Daniel Fett
Hi Peter, thanks, this is fixed in the (yet unpublished) version of the Security BCP. -Daniel Am 12.03.20 um 14:35 schrieb Pieter Philippaerts: > Hi everyone, > > I hope this is the right mailing list to submit mistakes in the OAuth > specifications... > > I was reading through the latest versio

[OAUTH-WG] Small error in OAuth BCP and new 2.1 draft...

2020-03-12 Thread Pieter Philippaerts
Hi everyone, I hope this is the right mailing list to submit mistakes in the OAuth specifications... I was reading through the latest version of the OAuth 2.0 Security Best Current Practice (version 14) and noticed a very small error. Section 2.1.1 reads: "To this end, they MUST either (a) pub