Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-22 Thread Vladimir Dzhuvinov
Thank you Justin for pointing this out. We had the exact same issue when we implemented encrypted JAR  - and ended up requiring the client_id. In the absence of a client_id as top level parameter symmetric encryption cannot be handled because there's no good way to find out the client_client secret

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-10 Thread Filip Skokan
That’s already kind of dealt with in JWE by having claims required for decryption duplicated in the JWE header. Odesláno z iPhonu > 10. 10. 2019 v 19:01, Justin Richer : > ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oa

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-10 Thread Justin Richer
In a related note, JAR currently allows “client_id” to be optional for exactly the reason of it being included in the request object. However, it falls into the same issue where you can’t decrypt the request object without knowing which client’s keys to use, and you can’t know which client you’r

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-10 Thread Justin Richer
Thanks for the response. My concern is that interpretation of the requirement to “authenticate the client” could be interpreted in the FAPI draft’s sense, which is to say validating the signature on the request object and not doing anything else. The problem comes from the fact that we’re effec

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-10 Thread Filip Skokan
> If several of these are sent, they need to be consistent. Given that client authentication precedes processing the rest of the request, if several client authentication methods are provided (header + secret or secret + assertion, etc) you generally reject the request, don't you? Then there's th

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-09 Thread Justin Richer
So in doing an implementation of this, I ran into this problem as well. Specifically, we need to know which client we’re dealing with to fully validate the encrypted request object as well as perform the authentication. Currently, things are a little underspecified, and part of that comes from t

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-04 Thread Takahiko Kawasaki
Hi Torsten, >2.3.1.5. Request entity too large > > If the request size was beyond the upper bound that the authorization > server allows, the authorization server shall return a "413 Request > Entity Too Large" HTTP error response. "413 Request Entity Too Large" should be changed to "413 P

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-10-01 Thread Justin Richer
To be clear, PAR is not the same as XYZ. Both are going to be inputs into the conversation under txauth, and there are similarities, but they shouldn’t be conflated. In PAR, the result has to be a URI because that’s what JAR defines as the input. With XYZ, you get returned two things: a transac

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Brian Campbell
That's certainly an option that could be considered. Trying to reuse some of JAR with request_uri makes a certain amount of sense. But maybe it's more baggage than it's worth. On Mon, Sep 30, 2019, 9:59 AM Torsten Lodderstedt wrote: > What if PAR would use another parameter? It could even return

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Brian Campbell
I think you did call it an API in the first place? :) endpoint is fine too though I believe Aaron's main point was that calling this REST is a bit of a stretch On Mon, Sep 30, 2019 at 9:57 AM Torsten Lodderstedt wrote: > I wouldn't call it an API. What about just calling it an "HTTP endpoint"?

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Torsten Lodderstedt
What if PAR would use another parameter? It could even return the actual authorization URL. > On 30. Sep 2019, at 08:45, Brian Campbell > wrote: > > > > On Thu, Sep 26, 2019 at 10:50 AM Justin Richer wrote: >> If, for whatever reason, it is required that this value is >> actually a URI, is

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Torsten Lodderstedt
I wouldn't call it an API. What about just calling it an "HTTP endpoint"? > On 30. Sep 2019, at 07:52, Brian Campbell wrote: > > > > On Thu, Sep 26, 2019 at 9:30 AM Aaron Parecki wrote: > > The pushed authorization request endpoint shall be a RESTful API > > I would drop the term RESTful and

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Brian Campbell
On Thu, Sep 26, 2019 at 10:50 AM Justin Richer wrote: > If, for whatever reason, it is required that this value is > actually a URI, is there some expected namespace to use other than > "example"? I worry that if all the examples in the spec are just > "urn:example:bwc4JK-ESC0w8acc191e-Y1LTC2" t

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Dick Hardt
I can understand the request URI being a URI that the client is providing the AS, but why would the client's request URI be at the AS? As Justin has explained it in the past, the AS is returning a handle to the transaction. The only party that understands that handle as far as I know is the AS. It

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-30 Thread Dave Tonge
So although for this spec, request_uri is just an opaque string, it is defined more generally in https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-19#section-2.2 as an: * Absolute URI from which the Request Object (Section 2.1) can be obtained* And in section 5.2 as: > *The "request_uri" val

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-27 Thread Dick Hardt
If I understand the proposal correctly, the request URI is opaque to the client. Correct? If so, why not just treat it as an opaque string? If I were implementing the protocol, I would have the blob be a signed token so that I could verify the integrity before making a database call. It much easi

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Justin Richer
Yes, the request object is JWT-based, but the request URI is not. In other words, you can post a JWT but what you get back is a URI, not the JWT itself. The request URI was always meant to be a reference, and originally it was explicitly a reference to a signed request object. — Justin On Sep

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Aaron Parecki
> The URI is intended to be a reference not a value. If the client could send a > JWT it would just send a request object instead of a request URI in the first > place. So the intent is that it’s random, and maybe we should just say that > explicitly. I thought this language was explicitly to a

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Justin Richer
Aaron, some comments inline. — Justin On Sep 26, 2019, at 8:30 AM, Aaron Parecki mailto:aa...@parecki.com>> wrote: Hi Torsten, I'm very glad to see this draft, I think it's definitely needed in this space. Here are some of my thoughts on the draft. "request_uri": "urn:example:bwc4JK-ESC0w8acc

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-23 Thread Filip Skokan
I find this to be an implementation detail, an optimization. As a matter of fact depending on the Request Object flavor the AS implements a second round of validation may be required. Odesláno z iPhonu > 23. 9. 2019 v 20:46, Janak Amarasena : > ___

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-23 Thread Torsten Lodderstedt
> Am 23.09.2019 um 20:46 schrieb Janak Amarasena : > >  > Hi, > >> Why do you think so? > > This is because I feel that validating the authorization request is part of > the authorization process and doing the validation is the responsibility of > the authorization endpoint. > > >> I w

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-23 Thread Janak Amarasena
Hi, Why do you think so? This is because I feel that validating the authorization request is part of the authorization process and doing the validation is the responsibility of the authorization endpoint. I would assume the same core service is used to check the payload, so no > code duplicati

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-23 Thread Torsten Lodderstedt
Hi Janak, thanks for your feedback to PAR as well. > On 22. Sep 2019, at 21:51, Janak Amarasena wrote: > > Hi, > > Since the /as/par endpoint is intended to be used to store the actual > authorization request I feel that validating the authorization request as > mentioned in point 2 section