Re: [OAUTH-WG] Clarifying the scope of the OAuth 2.1 spec
Dick Hardt <dick.hardt@gmail.com> Mon, 16 March 2020 19:32 UTC
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE8113A0FA2 for <oauth@ietfa.amsl.com>; Mon, 16 Mar 2020 12:32:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVlRjITh4WIp for <oauth@ietfa.amsl.com>; Mon, 16 Mar 2020 12:32:36 -0700 (PDT)
Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F07B93A0F9D for <oauth@ietf.org>; Mon, 16 Mar 2020 12:32:35 -0700 (PDT)
Received: by mail-lj1-x230.google.com with SMTP id o10so20047499ljc.8 for <oauth@ietf.org>; Mon, 16 Mar 2020 12:32:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=v/0VbBXOPfpHYdsBjG8qUplC8H/a8xYk+W1gfnjP7qI=; b=OnLs54T5Lt2Coo4VE2aBQAZ/Hua44ONgqDO1e5Sh1AnZhL8TgK/EeQb7veqPWpBusT e5exwkm4k+GXQJYJmeA8vBKi4WNbyxTikx/+9577vHrBcKnlq21NQaOrZ0THvDqkl3dn DOluLgY2SWZSTFt3XnX5uynOQ/yPq0weYWc4g3+CsBBPTxV71leBzV4bzh2UF8o7WqL+ zpDbFdqNvlNGfaT5306yoPeCI0i4TY/lYsPPVlRPu1dk1cDnBq07jDDzHFLXKRA0Q+24 Yn1XJ2Y6/nj3bQEvNks2i0nbXuJoUTifGW5mJuZNaACyvmfKMkipcg1Q1BCo2s9WJmLK k+fw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=v/0VbBXOPfpHYdsBjG8qUplC8H/a8xYk+W1gfnjP7qI=; b=GT/ir05iiG5XkSek6X1/y2r8EGzZU2q3abeqWAE/6nyhqF+HCBimiQb6Q4zJdI2t++ 8Z6wxG9RMRyuAhX7vJfA/xLmxhG4WmmcWB0AL9mfxbguhHNvINKysx3Ek7EP/55fWBhk THVR8CP0r6PeaPeq/3xN3EHlGKISdXBs9RMdeNgjtfUPRjhOsN/iJK+OjOjC/lhOEdig 23isvml3fBo8VxwY1+RYy64riP5SaOuNd5vRRMw0dCZ7yxF6A/I22RvPi5BSwct4BsIn juZMZt+ePlEMVJVlntrvFv5z0OIa0nvJCnoqUNzuCwnm7dwziPCuiSnkaka6dfMOKCs7 kotg==
X-Gm-Message-State: ANhLgQ3w8SHkH3MD1SOF0TvcxnE6OCHESdsZadEkQ1oE0HBP5z0UsspW DvIZg9i1WjNEN5vpBDH6M/CfF6GWucgLXptji5o=
X-Google-Smtp-Source: ADFU+vvl7gpCsq1D7FSHnu/SdIPiiiohb2wh3ohnXScEflfOzZWmSmeCNBfW3QbTkvzd1eu43LdD7ghEei2XyzCedDo=
X-Received: by 2002:a2e:9d84:: with SMTP id c4mr520913ljj.51.1584387153902; Mon, 16 Mar 2020 12:32:33 -0700 (PDT)
MIME-Version: 1.0
References: <DM6PR00MB06845FEB6201E73E87CA30B9F5F90@DM6PR00MB0684.namprd00.prod.outlook.com>
In-Reply-To: <DM6PR00MB06845FEB6201E73E87CA30B9F5F90@DM6PR00MB0684.namprd00.prod.outlook.com>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Mon, 16 Mar 2020 12:32:07 -0700
Message-ID: <CAD9ie-uZEjcnAF+N7ni6XMznaUWJxkFE7BTi+o2FLiQqhHA-Mg@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: "aaron@parecki.com" <aaron@parecki.com>, "torsten@lodderstedt.net" <torsten@lodderstedt.net>, "oauth@ietf.org" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007ec33b05a0fde125"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/-jGFQMZed8oIXDAjzFrXpYtNX6s>
Subject: Re: [OAUTH-WG] Clarifying the scope of the OAuth 2.1 spec
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Mar 2020 19:32:40 -0000
Thanks for the suggested text Mike. A little wordy for me, but I agree with the intention to minimize market place confusion. I'll discuss how to incorporate with my co-authors. ᐧ On Mon, Mar 16, 2020 at 11:35 AM Mike Jones <Michael.Jones@microsoft.com> wrote: > Thanks for the clarifications, Dick. Here’s my resulting proposed > changes. Part of my goal here is for people to understand the goals and > non-goals from reading the abstract. > > > > In the Abstract, change: > > This specification replaces and obsoletes the OAuth 2.0 Authorization > Framework described in RFC 6749 <https://tools.ietf.org/html/rfc6749>. > > to: > > This specification replaces and obsoletes these OAuth 2.0 specifications: > RFC 6749 and RFC 8252. It does so by removing portions of them that are no > longer considered best security practices; the portions that remain are > compatible with the corresponding portions of the specs being replaced. By > design, it does not introduce any new features to what already exists in > the OAuth 2.0 specifications being replaced. > > > > (If you want to list other non-RFCs that you believe that will be > obsoleted, you can do that too.) > > > > Add this text to the cited paragraph in Section 2.1: > > When this specification does not replace existing specifications produced > by the OAuth working group or other non-OAuth-working-group profiles of > OAuth that extend OAuth 2.0 via the IANA “OAuth Parameters” registry > [IANA.OAuth.Parameters], it is intended that those specifications will > continue to be used with OAuth 2.1 in the same manner that they are with > the OAuth 2.0 specifications being replaced. > > > > The reference for [IANA.OAuth.Parameters] is > https://www.iana.org/assignments/oauth-parameters/. > > > > The last sentence – saying that stuff not explicitly obsoleted isn’t being > changed – is critical to reducing the marketplace anxiety that this effort > might otherwise create. Please make it a goal to remove uncertainty and > sources of speculation wherever possible. > > > > Thanks again for the useful discussion. > > > > -- Mike > > > > *From:* Dick Hardt <dick.hardt@gmail.com> > *Sent:* Monday, March 16, 2020 8:36 AM > *To:* Mike Jones <Michael.Jones@microsoft.com> > *Cc:* aaron@parecki.com; torsten@lodderstedt.net; oauth@ietf.org > *Subject:* Re: Clarifying the scope of the OAuth 2.1 spec > > > > Hi Mike > > > > I'm aligned on the overall messaging. Sorry I was not clear on my feedback > -- it was directed at your suggested text, specifically the terms "OAuth > 2.0" and "OAuth 2.0 set of protocols" > > > > FYI: the "new" features, are not new to "OAuth 2.0" per se as they are > existing specifications -- my point was that they are not features that are > in RFC 6749. OAuth 2.1 is also NOT a superset of all 22 specifications. > > > > This paragraph in the 2.1 doc attempts to describe what OAuth 2.1 is and > is not: > > > > Since the publication of the OAuth 2.0 Authorization Framework ([RFC6749 > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC6749>]) in > October 2012, it has been updated by OAuth 2.0 for Native Apps ([RFC8252 > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC8252>]), > OAuth Security Best Current Practice ([I-D.ietf-oauth-security-topics > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>]), > and OAuth 2.0 for Browser-Based Apps ([I-D.ietf-oauth-browser-based-apps > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-browser-based-apps>]). > The OAuth 2.0 Authorization Framework: Bearer Token Usage ([RFC6750 > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC6750>]) > has also been updated with ([I-D.ietf-oauth-security-topics > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>]). > This Standards Track specification consolidates the information in all of > these documents and removes features that have been found to be insecure > in [I-D.ietf-oauth-security-topics > <https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics> > ]. > > > > What changes would you suggest to this? > > > > ᐧ > > > > On Sun, Mar 15, 2020 at 9:01 PM Mike Jones <Michael.Jones@microsoft.com> > wrote: > > I’m glad you like the direction of my comments. Sometimes saying what > you’re **not** doing is as important as saying what you **are** doing, > and I think this is such a case. > > > > As an example of why this matters, a developer recently asked me “Would we > have to use a different set of endpoints for OAuth 2.1?” We should clearly > scope this work so that the answer is “No, you would use the same > endpoints.” > > > > Given that the abstract talks about obsoleting OAuth 2.0, I believe it’s > important for the abstract to say what’s being obsoleted, what’s not being > obsoleted, and what the relationship of the new spec is to the one(s) it’s > obsoleting. As used in the vernacular by developers, I believe “OAuth 2.0” > commonly refers to the set of OAuth 2.0 RFCs approved by this working > group, which are the set of (currently 22) RFCs listed at > https://datatracker.ietf.org/wg/oauth/documents/ - as well as at least > some of the non-RFC specifications that extend OAuth 2.0 via the OAuth > registries at > https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml, > particularly [OAuth 2.0 Multiple Response Type Encoding Practices > <https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html>]. > I’m pretty sure you intend that OAuth 2.1 keep using much of that widely > deployed work and not replace it. You should be clear about that. > > > > Since you say that there are new features in OAuth 2.1, what are they and > are they essential to the OAuth 2.1 goals? Or if they’re not essential, > could they more profitably be factored into another specification so that > the new features can be used either with OAuth 2.0 and OAuth 2.1? That > might make the resulting messaging to developers much clearer. > > > > Thanks, > > -- Mike > > > > *From:* Dick Hardt <dick.hardt@gmail.com> > *Sent:* Sunday, March 15, 2020 6:50 PM > *To:* Mike Jones <Michael.Jones@microsoft.com> > *Cc:* aaron@parecki.com; torsten@lodderstedt.net; oauth@ietf.org > *Subject:* [EXTERNAL] Re: Clarifying the scope of the OAuth 2.1 spec > > > > Hi Mike > > > > I like where you are going with this, but what do we mean when we say > OAuth 2.0? Is it RFC 6749? What is the OAuth 2.0 set of protocols? > > > > OAuth 2.1 includes features that are not in RFC 6749, so it is not a > subset of that specification. > > ᐧ > > > > On Sun, Mar 15, 2020 at 2:34 PM Mike Jones <Michael.Jones@microsoft.com> > wrote: > > The abstract of draft-parecki-oauth-v2-1 concludes with this text: > > This specification replaces and obsoletes the OAuth 2.0 Authorization > Framework described in RFC 6749 <https://tools.ietf.org/html/rfc6749>. > > > > While accurate, I don’t believe that this text captures the full intent of > the OAuth 2.1 effort – specifically, to be a recommended subset of OAuth > 2.0, rather than to introduce incompatible changes to it. Therefore, I > request that these sentences be added to the abstract, to eliminate > confusion in the marketplace that might otherwise arise: > > > > OAuth 2.1 is a compatible subset of OAuth 2.0, removing features that > are not currently considered to be best practices. By design, it does not > introduce any new features to what already exists in the OAuth 2.0 set of > protocols. > > > > Thanks, > > -- Mike > > > > P.S. I assert that any incompatible changes should be proposed as part of > the TxAuth effort and not as part of OAuth 2.1. > > > >
- [OAUTH-WG] Clarifying the scope of the OAuth 2.1 … Mike Jones
- Re: [OAUTH-WG] Clarifying the scope of the OAuth … Dick Hardt
- Re: [OAUTH-WG] [EXTERNAL] Re: Clarifying the scop… Mike Jones
- Re: [OAUTH-WG] [EXTERNAL] Re: Clarifying the scop… Dick Hardt
- Re: [OAUTH-WG] Clarifying the scope of the OAuth … Mike Jones
- Re: [OAUTH-WG] Clarifying the scope of the OAuth … Dick Hardt
- Re: [OAUTH-WG] [EXTERNAL] Re: Clarifying the scop… Mike Jones
- Re: [OAUTH-WG] [EXTERNAL] Re: Clarifying the scop… Brian Campbell
- Re: [OAUTH-WG] [EXTERNAL] Re: Clarifying the scop… William Denniss