Re: [kitten] Suggested changes for -16 Re: I-D Action: draft-ietf-kitten-sasl-oauth-16.txt

Bill Mills <wmills_92105@yahoo.com> Thu, 18 September 2014 00:46 UTC

Return-Path: <wmills_92105@yahoo.com>
X-Original-To: kitten@ietfa.amsl.com
Delivered-To: kitten@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E087E1A6F1D for <kitten@ietfa.amsl.com>; Wed, 17 Sep 2014 17:46:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.04
X-Spam-Level:
X-Spam-Status: No, score=-2.04 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, DKIM_SIGNED=0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, FREEMAIL_REPLYTO_END_DIGIT=0.25, HTML_MESSAGE=0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-1.652, SPF_PASS=-0.001, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K3hxGL5yoj4D for <kitten@ietfa.amsl.com>; Wed, 17 Sep 2014 17:46:27 -0700 (PDT)
Received: from nm18-vm0.bullet.mail.bf1.yahoo.com (nm18-vm0.bullet.mail.bf1.yahoo.com [98.139.213.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8AEAA1A6F14 for <kitten@ietf.org>; Wed, 17 Sep 2014 17:46:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1411001186; bh=nhzo6cIjVDJvzgYbC92JOYnN/0deVGDCAownHWVtX6c=; h=Received:Received:Received:X-Yahoo-Newman-Property:X-Yahoo-Newman-Id:Date:From:Reply-To:To:Cc:Message-ID:In-Reply-To:References:Subject:MIME-Version:Content-Type:Content-Length:From:Subject; b=VsvPWfzkTuxbHOBMxO2+TsI3zyao8CMli5MVbjLTBmkIFP7KTT6uqQdf78/xnxRUXKE9cnh/L8J62Q3ewPXJrlNH8nwy5e/2d0iJbbe4yrQFN2bx6bIQRNYNtlsdtOSnm68R1VuuPUR8dHIcrRtZO5DawoZQQygWZHgeBAHjnSwystPi3STxuDdh/QJqahEAzVDoWpnfu3K7JcD+I+zD4zBUSZSql4M3u0j77knM7K1XjU0NLISdbOVmDBZrewPQijdo8dnfNtBOvuIfxbgnTe2D6nsDjDT0y8fxLTpziunbOiB03wus3l/zZgoBKv+DJGM1cyyZddZJXOnn5weogQ==
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=s2048; d=yahoo.com; b=tscXR3iQTLJWPPLdJdXYZUm3auFfylRz+19bdycfWJQnX/irZuFWf2QpzeMfF9JVCrFeWwYyc8WsGgM7hSuCiT0tl0D1/XjJ5K1Wbt+wqTfamsMTTDm8R8kGvKLqEOjIzlsfI3F0z1FEgIrpv9A2G42EchJcPT6r75vv1WSVt7qXMg9PkzcrX8+pfHHw0aqkcCPRsOtihwJtAAW60kEv3qlTbPaUAWhn5gmEHrIi1g8GJSijXvaykZDQudXrBPD5PvtJxMh2BPGkcFqBXzf0zMi+WuH+8Xzpixqz1GFiqApWkrYIuY7NefHa8huFaw9/sVCqb+1jSQYYEVe0VEAKfg==;
Received: from [98.139.212.149] by nm18.bullet.mail.bf1.yahoo.com with NNFMP; 18 Sep 2014 00:46:26 -0000
Received: from [98.139.212.215] by tm6.bullet.mail.bf1.yahoo.com with NNFMP; 18 Sep 2014 00:46:26 -0000
Received: from [127.0.0.1] by omp1024.mail.bf1.yahoo.com with NNFMP; 18 Sep 2014 00:46:26 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 474363.3442.bm@omp1024.mail.bf1.yahoo.com
Date: Thu, 18 Sep 2014 00:46:25 +0000
From: Bill Mills <wmills_92105@yahoo.com>
To: Benjamin Kaduk <kaduk@MIT.EDU>
Message-ID: <1629842008.197.1411001185518.JavaMail.yahoo@jws10638.mail.bf1.yahoo.com>
In-Reply-To: <alpine.GSO.1.10.1409162350510.21571@multics.mit.edu>
References: <alpine.GSO.1.10.1409162350510.21571@multics.mit.edu>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_196_249738370.1411001185509"
Archived-At: http://mailarchive.ietf.org/arch/msg/kitten/GiBEF0etvZ0H-XITChBPBNAiNIM
Cc: "kitten@ietf.org" <kitten@ietf.org>
Subject: Re: [kitten] Suggested changes for -16 Re: I-D Action: draft-ietf-kitten-sasl-oauth-16.txt
X-BeenThere: kitten@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: Bill Mills <wmills_92105@yahoo.com>
List-Id: Common Authentication Technologies - Next Generation <kitten.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/kitten>, <mailto:kitten-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/kitten/>
List-Post: <mailto:kitten@ietf.org>
List-Help: <mailto:kitten-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/kitten>, <mailto:kitten-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Sep 2014 00:46:30 -0000

for the nascent -17 draft: killed the comma splice, and removed the cruft server message that had the wrong status (401) in the base64 encoded stuff. 
The suggested text is from an off list conversation, bringing it to the list.
-bill

     On Wednesday, September 17, 2014 4:08 PM, Benjamin Kaduk <kaduk@MIT.EDU> wrote:
   

 On Tue, 16 Sep 2014, Bill Mills wrote:

> Resending with a more useful subject line.
>
>
>
> On Tuesday, September 16, 2014 5:04 PM, Bill Mills <wmills_92105@yahoo.com> wrote:
>
>
> -16 is submitted, and there is one suggested change (which I was

Thanks.

The new text for the "host" key/value has a comma splice.

In 4.3, there is an added message from the server.  Is that intended to
replace the previous value?

> supposed to have added in already and blew it), which is to replace
> section 3.2.2 with the text (farther) below.
> My comments on the suggested text:

I think I am confused or missed an email or something; I don't remember
why you were supposed to add this text.

> #1)  I don't think the dynamic registration stuff is baked enough to
> want to pull that in to the "oauth-configuration" definition.  I don't
> want to pull it in because I don't think dynamic registration is
> required for SASL/OAUTH (as evidenced by the Google and Outlook.com
> implementations.

Even in the new text it is OPTIONAL, which would seem consistent with the
lack of requirement.

> #2)  I didn't really want to make all of the OpenID elements required
> but I don't have a strong opinion here, my initial intent was to use the
> OpenID Discovery format as an existing format to be re-used here but
> leave it flexible.

The text in -16 seems more consistent with that goal than the text below.

> #3)  I am against recommending scope names at all in any way.  I would
> not include the last sentence of paragraph 5 below and strike the scope
> names.

I don't have any position on the use or inclusion of scopes; I am only
concerned that if someone concludes they need to use a scope, they have
some sense of how to do so/what to choose.  It seems that this is a matter
for generic OAuth specifications, not this document, most likely.

> New text for 3.2.2:
> -----------------------
> 3.2.2.  Server Response to Failed Authentication
>
>
> For a failed authentication the server returns a JSON [RFC4627]
> formatted error result, and fails the authentication.  The error
> result consists of the following values:
>
>
> status (REQUIRED):  The authorization error code.  Valid error
> codes are defined in the IANA "OAuth Extensions Error Registry"
> specified in the OAuth 2 core specification.
>
>
> scope (OPTIONAL):  An OAuth scope which is valid to access the
> service.  This may be empty which implies that unscoped tokens
> are required, or a scope value.  If a scope is specified then a
> single scope is preferred, use of a space separated list of
> scopes is NOT RECOMMENDED.
>
>
> oauth-configuration (OPTIONAL):  The URL for a document following
> the OpenID Provider Configuration Information schema, as
> described in Section 3 of the OpenID Connect Discovery
> [OpenID.Discovery], that is appropriate for the user.  The
> server MAY return different URLs for users from different
> domains and a client MUST NOT cache a single returned value and
> assume it applies for all users/domains that the server
> suports.  The returned discovery document MUST have all data
> elements required by the OpenID Connect Discovery specification

It seems slightly redundant to say that it MUST have all the required
features of the thing that it complies to, but maybe the extra emphasis is
needed.

-Ben

> populated.  In addition, the discovery document MUST contain
> the 'registration_endpoint' element to learn about the endpoint
> to be used with the Dynamic Client Registration protocol
> [I-D.ietf-oauth-dyn-reg] to obtain the minimum number of
> parameters necessary for the OAuth protocol exchange to
> function.  Authorization servers MUST implement the
> authorization code grant and other grant types MAY be
> supported.  Furthermore, authorization servers MUST implement
> the ability to issue refresh tokens for use with native
> applications to benefit from an abbreviated protocol exchange.
> The use of the 'offline_access' scope, as defined in
> [OpenID.Core] is RECOMMENDED to give clients the capability to
> explicitly request a refresh token.
>
>
> If the resource server provides a scope (as part of the element of
> the configuration payload) then the client MUST always request
> scoped tokens from the token endpoint.  This specification
> RECOMMMENDs the use of the following scopes:
>
> imap:  The 'imap' scope value is used to interact with IMAP mail
> servers.
>
> pop3:  The 'pop3' scope value is used to interact with POP3 mail
> servers.
>
> xmpp:  The 'xmpp' scope value is used to interact with XMPP servers.
>
>
>
> If the resource server provides no scope to the client then the
> client SHOULD presume an empty scope (unscoped token) is needed.
>
>
> Since clients may interact with a number of application servers,
> such as email servers and XMPP servers, they need to have a way
> to determine whether dynamic client registration has been performed
> already and whether an already available refresh token can be
> re-used to obtain an access token for the desired resource server.
> This specification RECOMMENDs that a client uses the information in
> the 'issue' element to make this determination.
> -----------------------
>
>
> I think we're getting very close :)
>
> -bill
>
>
>