Re: [Ace] comment on draft-ietf-ace-oauth-authz-26

Daniel Migault <daniel.migault@ericsson.com> Wed, 27 November 2019 16:03 UTC

Return-Path: <daniel.migault@ericsson.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B494120B94 for <ace@ietfa.amsl.com>; Wed, 27 Nov 2019 08:03:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lTKSVeW9gOLf for <ace@ietfa.amsl.com>; Wed, 27 Nov 2019 08:03:23 -0800 (PST)
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (mail-eopbgr680060.outbound.protection.outlook.com [40.107.68.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87279120B73 for <ace@ietf.org>; Wed, 27 Nov 2019 08:03:21 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TSbAJweq9IQ/QRul9z05UPgh4Y4n47tkgoBYE1AoyNEC0lSBeFUw/3favtFtMHgm6bQHExA9kzUerx0q9H+0ki4cqa9woICiA8sebTbeWguvPnlcVlcaQf4nklZ/4NhG4XJtBugAWiRO2eQncrkTwFeNkLQa5Q00XifVbTBumMU4rAdUuNMbEk0wEVeWevblf0dGp3JDAO+B3HAxV1rVOgvtkzuyP4hZ2Q5cYb5Lh08blohx0moASWQP9f6hPu8RouY3aVIM4qR0nw4tVMjdgBKe1IW3aBlt+fWNdNXO7yECPFk8HuwD9iFqPZHS6ZQM3xpZIGux2LJekSJsgbb/Zg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=S0CCQM9O5PBrsgSRd8aMt4BTQ7C2A3B3UteKZ/UEil0=; b=UXtEcnMKRULkdwaZ8tFVD/UKz1aQZe2iA9oJU5MIcPLWuufXC7fx8s5uDrI76VHXSfxXO39liaGCSg1TzW/Qq0j5nZyxUw4frI1KykJSWy2DevTfbLO7HEJr4epvT0kvIptG+OaWdRh7Q268eJKZ1nJApI8kEfDRODTdhD9N47ze+wy2oBU0RUVt5q303WKcqrVTNoZPdIQbpwQlmw4m0UmwiLauDbv44rZ0OvS17N++w0FXn/vuoaOXHIcaAv3JSY+dL5PGotaZokTJPr/vlYtpSlI/yWjE94zBRo/6rgzRGjDexf+NV28SuHhEgwDkz9khHB1kw2BuuKyIJNJOSQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=S0CCQM9O5PBrsgSRd8aMt4BTQ7C2A3B3UteKZ/UEil0=; b=Wd7xJlj0epZw7YhnTkrovLaoxoP7YUXNcx3jvQbOn6pBc4kHBlbV23BoTfPS9gR2AhHNfjvLIh3MjRoMbl7yVwGmn+cHETjSlsergHqG2uneoDajknJWqAzTauIIb/h+imyX0XNOvJOIVbGh9oiyfUwP4yG6+O6ZVlbUdAkMHL0=
Received: from CH2PR15MB3525.namprd15.prod.outlook.com (52.132.229.213) by CH2PR15MB3720.namprd15.prod.outlook.com (52.132.230.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2474.19; Wed, 27 Nov 2019 16:03:18 +0000
Received: from CH2PR15MB3525.namprd15.prod.outlook.com ([fe80::2c0a:15a6:920c:77a]) by CH2PR15MB3525.namprd15.prod.outlook.com ([fe80::2c0a:15a6:920c:77a%6]) with mapi id 15.20.2474.023; Wed, 27 Nov 2019 16:03:18 +0000
From: Daniel Migault <daniel.migault@ericsson.com>
To: Ludwig Seitz <ludwig.seitz@ri.se>, Cigdem Sengul <cigdem.sengul@gmail.com>
CC: "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] comment on draft-ietf-ace-oauth-authz-26
Thread-Index: AQHVoBODTRvmfj9LwkSkMn4vLe0h8aeU7P0AgAADQXCAAGtOAIAJs4cAgAAlMEA=
Date: Wed, 27 Nov 2019 16:03:18 +0000
Message-ID: <CH2PR15MB3525C933C1B5095AB9D6E4BAE3440@CH2PR15MB3525.namprd15.prod.outlook.com>
References: <CADZyTkkUsfeXcMo3pgZH47P2zWVdearXO4SLjvLOmDcGC4TptA@mail.gmail.com> <93a0ac2d-6d00-ad7b-677c-4c44b77f91e0@ri.se> <CH2PR15MB352544C3EB0EA2D5824C59BDE34E0@CH2PR15MB3525.namprd15.prod.outlook.com>, <CAA7SwCM60p-TSgNGhhcODiVZ3qayYgTLFhvwyGtp_up4hibqAA@mail.gmail.com> <VI1P18901MB07509B742395A6A51320695C82440@VI1P18901MB0750.EURP189.PROD.OUTLOOK.COM>
In-Reply-To: <VI1P18901MB07509B742395A6A51320695C82440@VI1P18901MB0750.EURP189.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=daniel.migault@ericsson.com;
x-originating-ip: [96.22.2.9]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 09ee6125-6f29-4d96-1e63-08d7735351c6
x-ms-traffictypediagnostic: CH2PR15MB3720:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <CH2PR15MB372009D25AB7224633473A69E3440@CH2PR15MB3720.namprd15.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 023495660C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(39860400002)(136003)(346002)(366004)(376002)(189003)(199004)(13464003)(51914003)(6436002)(66066001)(52536014)(102836004)(66446008)(6116002)(9686003)(3846002)(478600001)(305945005)(64756008)(53546011)(6306002)(229853002)(966005)(7736002)(66556008)(26005)(71200400001)(71190400001)(76116006)(44832011)(81166006)(6506007)(66476007)(186003)(74316002)(14444005)(6246003)(33656002)(256004)(8936002)(5660300002)(4326008)(55016002)(316002)(25786009)(11346002)(66946007)(446003)(8676002)(2906002)(7696005)(76176011)(81156014)(86362001)(14454004)(110136005)(99286004); DIR:OUT; SFP:1101; SCL:1; SRVR:CH2PR15MB3720; H:CH2PR15MB3525.namprd15.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: DFRcaxcLB5REcMPPRo6XtQiDKD1OBMnoCAGh0vLtVKnMvCf0VlE10JoUA3rGgXn2FnrTjjKaC3fqr47dJ/EkbZv7eOXRrpSA8BQhcu6sxGX/z7zAR3PKiseTfvjkFA93vOlr2sYtvqgm/VMKMMd63C46aaAfEaiu3eeNpCnWkB6UJWKt8XmMZVHaq1h45PdFz0N8L5NwpI5SkexIZh2obZLDj1rSmB1ROqLgfIi57gk0ckPtLE2TD1bW2Z1cg9LeqNH+kipO4hM80TFHGblDjCl18HsWuTyZsO+5tVbUcqY1CynkW1bcuyKe4IHCa/LuFIs/WQ1WMD2lCo19y+NKpEnUabOe4Hj5EiqCR0pXry/KQUZokqinOyLx845NUkyG8Mz99lZy0mTb1WiIp/gooTLHpdg5kU/U7PC4FEwkJAE4OFnzMsPgG/Aj7f3v+IgN+MUMdNZm6RRbxCKPEPOsGmn+GK+VefO6vqYtMY2jBgY=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 09ee6125-6f29-4d96-1e63-08d7735351c6
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Nov 2019 16:03:18.6223 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: VoSL25Ah4/x85ZShtWuW6U1DQmr5YesApBBXrOqgh09IId8138njH9pPIdGXwcRxzBrdr5pn+RKMxB6wrYUQAXVONi7hJt/r7DuxfpOyyKU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR15MB3720
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/X9sFarpxMWoj2r8qdfuLpmolbbs>
Subject: Re: [Ace] comment on draft-ietf-ace-oauth-authz-26
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Nov 2019 16:03:26 -0000

Hi, 

Just for clarification, as the one starting the thread, I believe that it is clear that  draft-ietf-ace-oauth-authz-26 has no issue and can be moved forward. 

Yours, 
Daniel

 

-----Original Message-----
From: Ludwig Seitz <ludwig.seitz@ri.se> 
Sent: Wednesday, November 27, 2019 8:36 AM
To: Cigdem Sengul <cigdem.sengul@gmail.com>; Daniel Migault <daniel.migault@ericsson.com>
Cc: ace@ietf.org
Subject: Re: [Ace] comment on draft-ietf-ace-oauth-authz-26

If you are using JSON-based interactions, I believe that the most straightforward way is to refer to RFC6749 for the error messages as you currently do. I don't find this confusing or problematic, but YMMV.

/Ludwig

________________________________________
From: Cigdem Sengul <cigdem.sengul@gmail.com>
Sent: Thursday, November 21, 2019 10:27 AM
To: Daniel Migault
Cc: Ludwig Seitz; ace@ietf.org
Subject: Re: [Ace] comment on draft-ietf-ace-oauth-authz-26

Hello,

Ludwig, I agree that the current draft describes specifically for when CBOR is used.
When CBOR is not used, I have read it as it will act similar to Section 5.2 of [RFC6749]<https://tools.ietf.org/html/rfc6749#section-5.2> as you have indicated also in the ace-oauth-authz document.

Therefore, instead of an indirect reference to RFC6749 by referencing ace-oauth-authz, we used a direct reference to explain what the error response should be.

Is this problematic? or confusing?

I can reword in mqtt_tls draft something like:
"As described in [ace-oauth-authz] the error responses for JSON-based interactions with AS follow RFC6749. When CBOR is used, the interactions MUST implement [ace-oauth-authz]"

Would that help?

Thanks,
--Cigdem



On Thu, Nov 21, 2019 at 3:06 AM Daniel Migault <daniel.migault=40ericsson..com@dmarc.ietf.org<mailto:40ericsson.com@dmarc.ietf.org>> wrote:
Hi Ludwig,

Thanks for the feed back. I was raising the issue before it got forgotten. , and I must say I did not checked whether it had been addressed or not, as I did not remember this had been raised for the ace-oauth-authz document.

What you are saying is that the draft has been updated already. I will have a closer look at it, and ask mqtt-profile to confirm the current text is fine.

Thanks!
Daniel

-----Original Message-----
From: Ace <ace-bounces@ietf.org<mailto:ace-bounces@ietf.org>> On Behalf Of Ludwig Seitz
Sent: Thursday, November 21, 2019 10:51 AM
To: ace@ietf.org<mailto:ace@ietf.org>
Subject: Re: [Ace] comment on draft-ietf-ace-oauth-authz-26

On 21/11/2019 03:29, Daniel Migault wrote:
> Hi,
>
> This only concerns potential clarification of the text.
>
> While reviewing mqtt-profile draft I raised an issue regarding the 
> reference for Oauth [RFC6749] while the remaining of the document 
> references draft-ietf-ace-oauth-authz [1]. My reading of 
> draft-ietf-ace-oauth-authz section 5.6.3 
> <https://tools..ietf.org/html/draft-ietf-ace-oauth-authz-26#section-5.6.3<http://ietf.org/html/draft-ietf-ace-oauth-authz-26#section-5.6.3>>.
> was the same of the one of mqtt-profile coauthors, that is error 
> mandates the use of CBOR. Discussing this with others it seems a mis 
> interpretation of  draft-ietf-ace-oauth-authz section 5.6.3 
> <https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-26#section-5.6.3> [2].
>
> I believe that is nice this is a mis-interpretation, but I would 
> recommend that the text makes it more explicit the use of JSON is 
> permitted. This seems to me a request to clarify the text.
>
> Yours,
> Daniel
>

I would be happy to add more clarification, but I'm currently at a loss of what that would be. Most of the bullets you cited already modify the MUSTs with "...when CBOR is used" or something similar to the same effect. The idea was to express: You can use the vanilla OAuth interactions based on JSON, but if you use CBOR then do it as specified here.

I am happy to take suggestions.

/Ludwig

> [1]
> """
>
>     In the case of an error, the AS returns error responses for HTTP-
>     based interactions as ASCII codes in JSON content, as defined in
>     Section 5.2 of RFC 6749  <https://tools.ietf.org/html/rfc6749#section-5.2>  [RFC6749  <https://tools.ietf.org/html/rfc6749>].
>
> """
>
> [2]
> """
>
>
>         5.6.3
>         <https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-26#section-5.6.3>.
>         Error Response
>
>
>
>     The error responses for CoAP-based interactions with the AS are
>     generally equivalent to the ones for HTTP-based interactions as
>     defined inSection 5.2 of [RFC6749]  <https://tools.ietf.org/html/rfc6749#section-5.2>, with the following exceptions:
>
>     o  When using CBOR the raw payload before being processed by the
>        communication security protocol MUST be encoded as a CBOR map.
>
>     o  A response code equivalent to the CoAP code 4.00 (Bad Request)
>        MUST be used for all error responses, except for invalid_client
>        where a response code equivalent to the CoAP code 4.01
>        (Unauthorized) MAY be used under the same conditions as specified
>        inSection 5.2 of [RFC6749]  <https://tools.ietf.org/html/rfc6749#section-5.2>.
>
>     o  The Content-Format (for CoAP-based interactions) or media type
>        (for HTTP-based interactions) "application/ace+cbor" MUST be used
>        for the error response.
>
>     o  The parameters "error", "error_description" and "error_uri" MUST
>        be abbreviated using the codes specified in Figure 12, when a CBOR
>        encoding is used.
>
>     o  The error code (i.e., value of the "error" parameter) MUST be
>        abbreviated as specified in Figure 10, when a CBOR encoding is
>        used.
> /------------------------+-------------\
>
>             | Name                   | CBOR Values |
>             |------------------------+-------------|
>             | invalid_request        |      1      |
>             | invalid_client         |      2      |
>             | invalid_grant          |      3      |
>             | unauthorized_client    |      4      |
>             | unsupported_grant_type |      5      |
>             | invalid_scope          |      6      |
>             | unsupported_pop_key    |      7      |
>             | incompatible_profiles  |      8      |
>             \------------------------+-------------/
>
>             Figure 10: CBOR abbreviations for common error codes
>
>     In addition to the error responses defined in OAuth 2.0, the
>     following behavior MUST be implemented by the AS:
>
>     o  If the client submits an asymmetric key in the token request that
>        the RS cannot process, the AS MUST reject that request with a
>        response code equivalent to the CoAP code 4.00 (Bad Request)
>        including the error code "unsupported_pop_key" defined in
>        Figure 10.
>
>     o  If the client and the RS it has requested an access token for do
>        not share a common profile, the AS MUST reject that request with a
>        response code equivalent to the CoAP code 4.00 (Bad Request)
>        including the error code "incompatible_profiles" defined in
>        Figure 10.
>
> """
>
> _______________________________________________
> Ace mailing list
> Ace@ietf.org<mailto:Ace@ietf.org>
> https://www.ietf.org/mailman/listinfo/ace
>


--
Ludwig Seitz, PhD
Security Lab, RISE
Phone +46(0)70-349 92 51

_______________________________________________
Ace mailing list
Ace@ietf.org<mailto:Ace@ietf.org>
https://www.ietf.org/mailman/listinfo/ace