Re: [OAUTH-WG] review: draft-ietf-oauth-json-web-token-05

David Chadwick <d.w.chadwick@kent.ac.uk> Mon, 31 December 2012 10:11 UTC

Return-Path: <d.w.chadwick@kent.ac.uk>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 70DD521F84D8 for <oauth@ietfa.amsl.com>; Mon, 31 Dec 2012 02:11:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H-fB-UhxJ1Bg for <oauth@ietfa.amsl.com>; Mon, 31 Dec 2012 02:11:55 -0800 (PST)
Received: from mx1.kent.ac.uk (mx1.kent.ac.uk [129.12.21.39]) by ietfa.amsl.com (Postfix) with ESMTP id 5030621F8941 for <oauth@ietf.org>; Mon, 31 Dec 2012 02:11:54 -0800 (PST)
Received: from mx0.kent.ac.uk ([129.12.21.32]) by mx1.kent.ac.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from <d.w.chadwick@kent.ac.uk>) id 1TpcLX-0007Vl-8Y; Mon, 31 Dec 2012 10:11:51 +0000
Received: from [31.185.222.175] (helo=[192.168.1.64]) by mx0.kent.ac.uk with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from <d.w.chadwick@kent.ac.uk>) id 1TpcLW-0001Gu-L6; Mon, 31 Dec 2012 10:11:51 +0000
Message-ID: <50E164E5.9010509@kent.ac.uk>
Date: Mon, 31 Dec 2012 10:11:49 +0000
From: David Chadwick <d.w.chadwick@kent.ac.uk>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/17.0 Thunderbird/17.0
MIME-Version: 1.0
To: Anthony Nadalin <tonynad@microsoft.com>
References: <4E1F6AAD24975D4BA5B1680429673943669B0B1F@TK5EX14MBXC283.redmond.corp.microsoft.com> <50DEBAF4.6040700@kent.ac.uk> <517e9248dbf944d2a275b4850609f63c@BY2PR03MB041.namprd03.prod.outlook.com> <50DFF93F.5050906@kent.ac.uk> <586fa0a965614efb86d8f281609ea467@BY2PR03MB041.namprd03.prod.outlook.com>
In-Reply-To: <586fa0a965614efb86d8f281609ea467@BY2PR03MB041.namprd03.prod.outlook.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Cc: IETF oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] review: draft-ietf-oauth-json-web-token-05
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Dec 2012 10:11:56 -0000

I think you must have misread my email, since your reply seems to agree 
with mine, that the claim is always in doubt. My comment was about a 
credential

regards

David

On 30/12/2012 16:35, Anthony Nadalin wrote:
> Nope, disagree as a claim is always in doubt thus it has no proof, the proof comes in the verification
>
> -----Original Message-----
> From: David Chadwick [mailto:d.w.chadwick@kent.ac.uk]
> Sent: Sunday, December 30, 2012 12:20 AM
> To: Anthony Nadalin
> Cc: Mike Jones; IETF oauth WG
> Subject: Re: [OAUTH-WG] review: draft-ietf-oauth-json-web-token-05
>
> On 30/12/2012 00:28, Anthony Nadalin wrote:
>> By definition a claim is always in doubt thus it would not call it a
>> credential until it is verified
>
> No this is not correct, since you can have valid and invalid credentials. You present your credentials to the RP, and the RP verifies them based on the proof they contain.
>
> If you present a claim without any proof then it is not a credential and it cannot be verified (since it contains no proof) without the RP obtaining some proof information from elsewhere (such as showing it to the issuer and asking them if it is genuine or not).
>
> So I would say that in Oauth you can present a claim or a credential.
>
> regards
>
> David
>
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of David Chadwick
>> Sent: Saturday, December 29, 2012 1:42 AM
>> To: Mike Jones
>> Cc: IETF oauth WG
>> Subject: Re: [OAUTH-WG] review: draft-ietf-oauth-json-web-token-05
>>
>> If a claim provides proof then I would call it a credential not a
>> claim
>>
>> David
>>
>> On 29/12/2012 01:11, Mike Jones wrote:
>>> I found the X.1252 definition.  It is:
>>>
>>> *6.18 claim *[b-OED]: To state as being the case, without being able
>>> to give proof.
>>>
>>> That seems both a bit vague, and actually incorrect, as the JWT may
>>> include proof of the veracity of the claim.  Please see the updated
>>> JWT draft for a hopefully more useful “Claim” definition.
>>>
>>>                                                                Best
>>> wishes,
>>>
>>>                                                                -- Mike
>>>
>>> *From:*Mike Jones
>>> *Sent:* Sunday, December 23, 2012 1:03 PM
>>> *To:* Jeff Hodges; Nat Sakimura
>>> *Cc:* IETF oauth WG
>>> *Subject:* RE: [OAUTH-WG] review: draft-ietf-oauth-json-web-token-05
>>>
>>> What is the X.1252 definition?
>>>
>>> -- Mike
>>>
>>> *From:* Nat Sakimura
>>> *Sent:* ‎December‎ ‎23‎, ‎2012 ‎10‎:‎09‎ ‎AM
>>> *To:* =JeffH
>>> *CC:* Mike Jones, IETF oauth WG
>>> *Subject:* Re: [OAUTH-WG] review: draft-ietf-oauth-json-web-token-05
>>>
>>> Re definition of 'claim', as JWT is supposed to be generic, it may be
>>> better to go with the definition of X.1252 rather than OIDC.
>>>
>>> =nat via iPhone
>>>
>>> Dec 24, 2012 2:42、=JeffH <Jeff.Hodges@kingsmountain.com
>>> <mailto:Jeff.Hodges@kingsmountain.com>> のメッセージ:
>>>
>>>>
>>>>> Thanks for the replies, Jeff.  They make sense.  Particularly,
>>>>> thanks for the "JSON Text Object" suggestion.
>>>>
>>>> welcome, glad they made some sense.
>>>>
>>>> similarly, if one employs JSON arrays, I'd define a "JSON text array".
>>>>
>>>>
>>>>> For the "claims" definition, I'm actually prone to go with
>>>>> definitions based  on those in
>>>>> http://openid.net/specs/openid-connect-messages-1_0-13.html#termino
>>>>> l
>>>>> ogy-
>>>>> specifically:
>>>>>
>>>>> Claim
>>>>> A piece of information about an Entity that a Claims Provider
>>>>> asserts about that Entity.
>>>>> Claims Provider
>>>>> A system or service that can return Claims about an Entity.
>>>>> End-User
>>>>> A human user of a system or service.
>>>>> Entity
>>>>> Something that has a separate and distinct existence and that can
>>>>> be identified in context. An End-User is one example of an Entity.
>>>>
>>>> well, it seems to me, given the manner in which the JWT spec is
>>>> written, one can make the case that JWT claims in general aren't
>>>> necessarily about an Entity (as the latter term is used in the
>>>> context of the OpenID Connect specs), rather they're in general
>>>> simply assertions about something(s). this is because all
>>>> pre-defined
>>> JWT claim types are optional and all JWT semantics are left up to
>>> specs that profile (aka re-use) the JWT spec.
>>>>
>>>> HTH,
>>>>
>>>> =JeffH
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>>
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
>