Re: [Last-Call] [Gen-art] Genart last call review of draft-ietf-oauth-rar-15

Brian Campbell <bcampbell@pingidentity.com> Thu, 01 December 2022 20:46 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CB2CC14CE52 for <last-call@ietfa.amsl.com>; Thu, 1 Dec 2022 12:46:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.093
X-Spam-Level:
X-Spam-Status: No, score=-2.093 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IpJ5rUHlQY4w for <last-call@ietfa.amsl.com>; Thu, 1 Dec 2022 12:46:12 -0800 (PST)
Received: from mail-yb1-xb36.google.com (mail-yb1-xb36.google.com [IPv6:2607:f8b0:4864:20::b36]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63E2FC14CE54 for <last-call@ietf.org>; Thu, 1 Dec 2022 12:46:12 -0800 (PST)
Received: by mail-yb1-xb36.google.com with SMTP id l67so3644753ybl.1 for <last-call@ietf.org>; Thu, 01 Dec 2022 12:46:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=4WC6JPpUK4xRB0NZcWzxQDjMLT+p9mlW2O9gpRwD7Cs=; b=R7ahlQhvxqF42IO8hfdgY1p/WCDS+wbeeX4SIZWpctdlG4cLp2eNbHykx+Srq/E1dz n4t0MTX2sUbJ4OCFHXkPvB6AJ/PThreP+3ilxFn2RBp4aNNK5VVS/gkG6rpcjglBMK0k li2k2lR/xkJ1RCXG3b+O92p6wHF0BA1Hs3E5CwaOC6mdSN3l1dO0e022Pm5qRcDqDcla AazdrK/alUEEsiUU5Dn8mDWf8Vxct6TJlcL6/sJ+L7P1k1ffNYXFqgJ5buewK8XYiZyX VbbQvdCbidnQxSnnf9DRzOdDN3BqzF739TqVHXhoaGqIHTgTCx42drizlddkd122MX6A 4fjw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=4WC6JPpUK4xRB0NZcWzxQDjMLT+p9mlW2O9gpRwD7Cs=; b=UrG5Cq2E6/CSw68IPFtTWCEYRVGlvObpKMUD4wDGn99s2JC9HqL/gxCLmcQ9xKAWq1 e/wq5r8eUP/q9HBCluTAe93QlLu4mX/zefEkMijwB8Tz4FPDg273DGmZ6TF5wFFiV+wq GKzvELoHZkpiE9PwIWCg+6PBxL2iUq/pNf3sHUOiNqqN4H+VG87N2bDBc77SpcA7+h+w nmqXc01p4FHf83uWwi0PraJ7Y94s9HkXSxpBL8K0BrZ8KptrKRqvxaTzudBTLnap5DDr 4o7SE2FFkOZylv11jcmfAdqynAAvOI9gES7V/6VTDAQQ7LMZuw4s7krxX4F/xUKWhJ9J oIbA==
X-Gm-Message-State: ANoB5pn4zcRc7N6mRcUeNBoH+j9/SNjP44aYb4BUjQ3C1IJIHlvCL/ut rmM+GnH4xe9rW9crLO5a7XKxQWkFLkyuUoXJ9F9GVAXH+iiNBy6CvMnuBXBNAAGe9lVw6W5jVc0 2hjAdbyfT6nTqVdiIQF8=
X-Google-Smtp-Source: AA0mqf7MNiDUqfHo5zYZId39qejKJf5ANVSMvIsBSpCxl7quWt0XbBdbKIVrtyWNJjev2DxTDLpsCKcUvUKFkPPajgQ=
X-Received: by 2002:a25:d78a:0:b0:6f3:11ef:6c72 with SMTP id o132-20020a25d78a000000b006f311ef6c72mr31393775ybg.124.1669927570984; Thu, 01 Dec 2022 12:46:10 -0800 (PST)
MIME-Version: 1.0
References: <166872457082.62668.15876743882764157331@ietfa.amsl.com> <ee3757aa-2ac1-4f5b-b77f-1831ac5781bd@nostrum.com> <193798dd-5a78-a2eb-cdc9-0a90764e2b7b@nostrum.com> <CA+k3eCTX66JJti8sVmKOC=oM242T72+U4bk1D4fTqphRy74qSg@mail.gmail.com> <fba1f40b-ad75-6008-bd0c-195d719dfde1@nostrum.com> <CA+k3eCSzk6Nx4j6GMiFjjSRWy2cKVwmj4UP1miNmkhDcc4cRQQ@mail.gmail.com> <3a74cefe-e941-6f51-e232-c77e1b7b83c0@nostrum.com>
In-Reply-To: <3a74cefe-e941-6f51-e232-c77e1b7b83c0@nostrum.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Thu, 01 Dec 2022 13:45:17 -0700
Message-ID: <CA+k3eCRTkZGSOWw7rWL2KVHU=8HPd8Vyu+6J3mDbETsxqLpHLw@mail.gmail.com>
To: Robert Sparks <rjsparks@nostrum.com>
Cc: gen-art@ietf.org, draft-ietf-oauth-rar.all@ietf.org, last-call@ietf.org, oauth@ietf.org
Content-Type: multipart/alternative; boundary="000000000000abccca05eeca4fd6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/AvyWC7rDBGi7dQ-VEJN4jhm5Pso>
Subject: Re: [Last-Call] [Gen-art] Genart last call review of draft-ietf-oauth-rar-15
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Dec 2022 20:46:16 -0000

On Wed, Nov 30, 2022 at 5:04 PM Robert Sparks <rjsparks@nostrum.com> wrote:

>
> On 11/30/22 5:53 PM, Brian Campbell wrote:
>
>
>
> On Wed, Nov 30, 2022 at 4:08 PM Robert Sparks <rjsparks@nostrum.com>
> wrote:
>
>>
>> On 11/30/22 2:39 PM, Brian Campbell wrote:
>>
>> <snip>
>>
>> On Thu, Nov 17, 2022 at 3:45 PM Robert Sparks <rjsparks@nostrum.com>
>> wrote:
>> <snip>
>>
>>> I have two major issues that I think need discussion:
>>>
>>> Major Issue 1) The document seems to be specifying a new way of
>>> comparing json names, claiming it is what RFC8259 requires, but I
>>> disagree that RFC8259 says what this document is claiming. If I'm
>>> correct, the document is trying to rely on the text in section 7 of
>>> RFC8259 to support the idea that implementation MUST NOT alter the json
>>> names (such as applying Unicode normalization) before comparison and
>>> that the comparison MUST be performed octet-by-octet. Rather, section 7
>>> says something more like "you better escape and unescape stuff correctly
>>> if you’re going to do unicode codepoint by codepoint comparison" which
>>> is a completely different statement.
>>>
>>> If I'm right, and this is a new comparison rule that goes beyond what
>>> JSON itself defines, I think the group should seek extra guidance from
>>> Unicode experts. If I'm wrong and this behavior is defined somewhere
>>> else, please provide a better pointer to the definition.
>>>
>>> In many environments, its unusual for an implementation relying on a
>>> stack below it to have any say at all on whether normalization is going
>>> to be applied to the unicode before the application gets to look. Rather
>>> than trying to work around the problem you've identified with
>>> normalization by specifying the comparison algorithm, consider just
>>> making stronger statements about the strings used in the json names the
>>> document defines. Why _can't_ you restrict the authorization_details
>>> values to ascii? If it's because you want to present the string to a
>>> user, consider putting a presentation string elsewhere in the json that
>>> is not used for comparison.
>>>
>>
>> To the best of my understanding, it's not trying to specify a new or
>> different way of comparing JSON names or values. I think it's only trying
>> to say that the application must not do any *additional* normalization of
>> the string values that it gets from the JSON stack or any other extra
>> processing for the sake of comparison. I think anyway.
>>
>> Honestly, I didn't really (and still don't) understand the concerns that
>> some of the WG had that led to the text in question. So I didn't pay close
>> attention to it while thinking to myself there can't be harm in saying to
>> do a byte-by-byte comparison with no additional processing. But here we
>> are...
>>
>> Does that halfhearted explanation alleviate your concerns at all? Or,
>> with that explanation in mind, are there specific changes to the text (in sec
>> 12
>> <https://www.ietf.org/archive/id/draft-ietf-oauth-rar-15.html#section-12>
>> and sec 2
>> <https://www.ietf.org/archive/id/draft-ietf-oauth-rar-15.html#section-2>,
>> I think) that would alleviate your concerns? Or do we need to consider just
>> deleting those parts?
>>
>> I did track down this issue about it
>> https://github.com/oauthstuff/draft-oauth-rar/issues/28 for maybe added
>> context.
>>
>> Thanks for that pointer. If that's the extent, then I really think the
>> group should walk this back just a little and answer why restricting these
>> names to (a subset of) ascii is an unacceptable thing to do. The
>> conversation there reinforces my guess that these aren't meant for display
>> to users, so why take on the additional complexity? Make it easy for
>> implementors to get it right with much less effort.
>>
>
> Yes, that guess is correct that type value is not meant for display to
> users (the issue is about type value). I can't confidently say the same
> about names and values that any particular type will define. I don't think
> it matters though. It's not that restricting is unacceptable but that it's
> not necessary. Just using the values that come from the JSON layer is
> enough. And I'd contend there's not really additional complexity. It just
> appears like additional complexity because of the unnecessary and maybe
> less than idea wording in the draft. Wording that I'd be more than happy to
> try and fix up or just remove.
>
> If you can change it to "compare these the same way you would compare
> anything else out of json" and the group is fine with it, then great.
>

Okay, I've changed it attempting to say that with
https://github.com/oauthstuff/draft-oauth-rar/pull/94/commits/98e1b73ff3cad699191606eaf9278e6653fe7493

The WG is on this thread so I expect/hope that anyone that isn't fine with
it will chime in.


<snip>

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._