Re: [OAUTH-WG] Diversity and Inclusiveness in the IETF

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Wed, 24 February 2021 09:09 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3B0B93A1232 for <oauth@ietfa.amsl.com>; Wed, 24 Feb 2021 01:09:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.1
X-Spam-Level: *
X-Spam-Status: No, score=1.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RAND_MKTG_HEADER=2.999, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=mJqF8S0N; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=mJqF8S0N
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qQ6154wTxLrK for <oauth@ietfa.amsl.com>; Wed, 24 Feb 2021 01:09:28 -0800 (PST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80042.outbound.protection.outlook.com [40.107.8.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70FB63A1230 for <oauth@ietf.org>; Wed, 24 Feb 2021 01:09:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0/nOFX/WPVK2YQcReG99X/LEn7mJ8XEG2OTlWv8BA9M=; b=mJqF8S0NoDoMwyQpyrzJa+WB6RT2Mu+Kb/oaSJpCVO1rWdXPdiMjFXTf3WsnXnrMc0pEoU8g+tb3UYelc7a/+kAKvnENZd8QkDg1xvEiYbnIK4cvQC/RcbA3me+Dm3sbQJaNdJFegEBgcqE4x7OSzkLYLNZb8rCb1Ud/1+Lm9w8=
Received: from AM6PR0502CA0047.eurprd05.prod.outlook.com (2603:10a6:20b:56::24) by AM0PR08MB3971.eurprd08.prod.outlook.com (2603:10a6:208:132::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.32; Wed, 24 Feb 2021 09:09:23 +0000
Received: from AM5EUR03FT033.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:56:cafe::e7) by AM6PR0502CA0047.outlook.office365.com (2603:10a6:20b:56::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19 via Frontend Transport; Wed, 24 Feb 2021 09:09:23 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT033.mail.protection.outlook.com (10.152.16.99) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19 via Frontend Transport; Wed, 24 Feb 2021 09:09:23 +0000
Received: ("Tessian outbound edf60a9f3ac0:v71"); Wed, 24 Feb 2021 09:09:23 +0000
X-CR-MTA-TID: 64aa7808
Received: from 00c09f170cb1.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 8C4FDC24-EF68-4201-8800-8487A4799701.1; Wed, 24 Feb 2021 09:09:18 +0000
Received: from EUR03-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 00c09f170cb1.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 24 Feb 2021 09:09:18 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hxNhS9mbhymWJyUTBt9QVWAP/ACmFE+QTRKqgNcWYUasi51bmd/ZF9VNEizRdvhklv1iyCBI+2sjnnltEpGRtm9xq+kWOovIa4OtfYHm8GQHJceQOqLiETtqIX6G/MDINdcFH6EU5I04d0VQLlqB+CkRL7acvYkDpUOXGW9kufdCAZxWGTATK/cQ8PPSOzS6OzbQPo2yLvS7A4iokaSRmuANDgJqQ+LqvjrXJvd4kdQdUB+Iao3ENGiKayzKri4m7nLfYbaRK/3JEX1MzH86xJ6r/62QN+nr4TUY/SifXHsg93Z6yZ7omUeYqPBDSt1MlIb9A/6EPoWMEAJIQy4CMA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0/nOFX/WPVK2YQcReG99X/LEn7mJ8XEG2OTlWv8BA9M=; b=fjU53FSj6ZhzV83/3ixMNjrwKYKZDYF+bVDeAKzeuQv9Bk02esMRnEvIpS+VOCadrsiA5Gki4lE/QfPa0iR8c+iPeXeA21/mfy8rveIEabwI6YB19TnV9D4Mi5L5EVW7dlbBm/kQoowG4aUkqCvnqzaEvihdgTbwCpVV//9H1fCo55/VkTT1zj5u2o4vv/wqHlVUireRje6bbRU8DO6TElOrR8c0G722sMsBFgZF6fbqBwvU/tL+EKj3LrHaj6eQmSOel0/9qilagXie/oadqbADq4YkxkI3I4vxupm+gukshGm2LLC4YAYx0M53FQcCnCthhZeQ4zn6GilwTBiVmQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0/nOFX/WPVK2YQcReG99X/LEn7mJ8XEG2OTlWv8BA9M=; b=mJqF8S0NoDoMwyQpyrzJa+WB6RT2Mu+Kb/oaSJpCVO1rWdXPdiMjFXTf3WsnXnrMc0pEoU8g+tb3UYelc7a/+kAKvnENZd8QkDg1xvEiYbnIK4cvQC/RcbA3me+Dm3sbQJaNdJFegEBgcqE4x7OSzkLYLNZb8rCb1Ud/1+Lm9w8=
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com (2603:10a6:208:106::13) by AM4PR0802MB2339.eurprd08.prod.outlook.com (2603:10a6:200:64::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.31; Wed, 24 Feb 2021 09:09:11 +0000
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::7484:8c2b:e664:648]) by AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::7484:8c2b:e664:648%7]) with mapi id 15.20.3868.033; Wed, 24 Feb 2021 09:09:11 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
CC: "oauth@ietf.org" <oauth@ietf.org>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Thread-Topic: Diversity and Inclusiveness in the IETF
Thread-Index: AQHXCXgbtlRdrPa6OEShU5hVFqdRTqplIz0AgABqRRCAABPPgIAADfGAgAABowCAABzOAIAADk2AgADyA4CAAB4IYA==
Date: Wed, 24 Feb 2021 09:09:11 +0000
Message-ID: <AM0PR08MB37168F0895CC638ED5222E65FA9F9@AM0PR08MB3716.eurprd08.prod.outlook.com>
References: <37eecb9b-f0eb-e21c-b162-b1f0339e4981@si6networks.com> <3c2d646d-f18d-4d88-b458-29dbd486432b@beta.fastmail.com> <AM0PR08MB371669108E9CEA561BEC9EF6FA809@AM0PR08MB3716.eurprd08.prod.outlook.com> <d6648437-332b-4668-a1c7-591f2c287539@dogfood.fastmail.com> <CADNypP8GKTY-Jhpb6AEfcpXOihwLap7OrrByNemGc2GNvZLeog@mail.gmail.com> <10fd9d2d-afb4-44aa-b618-fb5ce1efa69e@dogfood.fastmail.com> <c21477c8f68047cabac7aeae60a688f2@cert.org> <CAHbuEH7Qvc3AaBxbk1kXd4knS4_+Wrs3P7WNETRNNoFP-dGNCA@mail.gmail.com> <CAMm+LwgbK3HYDjSHnTN3f6hWSQCQrEjHLNn6z0JpfY7hdxaQpg@mail.gmail.com>
In-Reply-To: <CAMm+LwgbK3HYDjSHnTN3f6hWSQCQrEjHLNn6z0JpfY7hdxaQpg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 165A7427B810AF4C929689B7AC7C3E44.0
x-checkrecipientchecked: true
Authentication-Results-Original: hallambaker.com; dkim=none (message not signed) header.d=none;hallambaker.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.92.115.86]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 5b3f6b49-a286-4891-73cc-08d8d8a3e0aa
x-ms-traffictypediagnostic: AM4PR0802MB2339:|AM0PR08MB3971:
X-Microsoft-Antispam-PRVS: <AM0PR08MB3971B452E9CA5C2269948B7EFA9F9@AM0PR08MB3971.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8882;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB3716.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(366004)(396003)(39860400002)(136003)(346002)(76116006)(86362001)(53546011)(8676002)(8936002)(2906002)(5660300002)(6916009)(66946007)(6506007)(9326002)(52536014)(316002)(83380400001)(54906003)(478600001)(9686003)(186003)(71200400001)(66574015)(66446008)(55016002)(66476007)(64756008)(66556008)(4326008)(26005)(7696005)(33656002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR08MB37168F0895CC638ED5222E65FA9F9AM0PR08MB3716eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0802MB2339
Original-Authentication-Results: hallambaker.com; dkim=none (message not signed) header.d=none;hallambaker.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT033.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 1de63107-9f37-4108-95e5-08d8d8a3d989
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(39860400002)(376002)(346002)(396003)(136003)(46966006)(36840700001)(83380400001)(33656002)(86362001)(8936002)(26005)(107886003)(8676002)(336012)(82740400003)(36860700001)(70206006)(47076005)(30864003)(2906002)(54906003)(316002)(9326002)(55016002)(4326008)(186003)(53546011)(66574015)(6506007)(478600001)(81166007)(33964004)(7696005)(9686003)(356005)(82310400003)(5660300002)(6862004)(52536014)(70586007); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Feb 2021 09:09:23.2711 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5b3f6b49-a286-4891-73cc-08d8d8a3e0aa
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT033.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3971
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/7T_COWhEkmepe0OeFM3GeCcGcZ4>
Subject: Re: [OAUTH-WG] Diversity and Inclusiveness in the IETF
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Feb 2021 09:09:31 -0000

Hi Phil,

I am moving this to the OAuth group to avoid confusing the IETF list any further.

See my feedback below.

From: ietf <ietf-bounces@ietf.org> On Behalf Of Phillip Hallam-Baker
Sent: Wednesday, February 24, 2021 6:47 AM
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Cc: ietf@ietf.org; oauth@ietf.org
Subject: Re: Diversity and Inclusiveness in the IETF

I am worried by the advice 'use OAUTH' but for a very different reason.

OAUTH and SAML are both attempts to provide a secure authentication scheme that works within the very particular and very peculiar environment of Web browsers. They are schemes that necessarily involve techniques that are rightly regarded as alchemy if not outright witchcraft.

[Hannes] OAuth and SAML were initially developed for the Web because the web is an important deployment use case. Both protocols had a very different history and also different use cases. OAuth is for delegated access and SAML was developed as a WebSSO solution. OAuth and SAML were later extended to other environments too. In case of OAuth you can find some of this info in our documents, such as the OAuth 2.0 for native apps.

That is fine, that is more than fine if you are developing an authentication scheme for use within Web browsers (or if you are developing whatever SAML and OAUTH are these days, neither was originally billed as authentication).

[Hannes] OAuth is not an authentication scheme, particularly when referring to users. It is explicitly the intention to keep the user authentication part outside OAuth, which allows us to use the most modern user authentication technology available without having to touch OAuth.

But it is completely inappropriate to ever suggest let alone demand that anyone use a technology whose primary design constraint is to work around the voodoo of Javascript, URIs, HTTP cookies etc. etc. in an application where none of those legacy issues apply.

[Hannes] It is difficult to comment on this because I don’t know the context. Maybe OAuth was a fine choice and maybe it wasn’t. I don’t know. We all agree that OAuth is not going to be the answer to every question.

One of the big problems of IETF is that a lot of people don't think about how to get their scheme deployed and when they do, their plan is to tie it to some other group as a boat anchor.

[Hannes] In general, standing on the shoulders of giants is not a bad approach. Changes are that there is a potential for re-use. OAuth also wasn’t produced in a vacuum either. We use JSON as an encoding for the access tokens with the JWT when the work in the JOSE group was started. We also had to work with the nuances of HTTP. We made use of TLS.

Back when we were doing DKIM and SPF we had to tell certain DNS folk that the fact that almost no DNS Registrars offered customers the ability to specify new RRTypes was their problem and was going to remain their problem no matter how loudly they tried to complain that it should become our problem.

[Hannes] I cannot comment on DKIM and SPK because I was not involved in that work.

In the case of OAUTH, there is another problem in that OAUTH really isn't a very open protocol from the standpoint of the user. I can use my Google or my Facebook or my Twitter accounts to log in via OAUTH at a large number of sites. But if I want to use any other OAUTH provider I am completely out of luck. Or at least I will be until this becomes one of the multifaceted complaints in the anti-trust hearings coming soon to a capitol hill near you. And yes, that is a consequence of how the protocol has been deployed, but that probably not going to get people very far on capitol hill.

[Hannes] OAuth 2.0 is a specification. It has a couple of flows. A product and a service adds more to OAuth, i.e. OAuth is just a building block in a larger ecosystem. That ecosystem will contain the actual application and also the user authentication component (among other things). Companies make their own decision about how they want to use OAuth in their product. A fitness company may decide to allow its users to share their heart rate data with others (assuming consent of the user). It may also decide not to do it. It is a business decision. OAuth allows you to do it securely with the consent of the user. Neither the OAuth spec nor the IETF can tell companies who they should work with.

The Internet is for everyone. The Internet is for end users.

[Hannes] Those are great words but they mean nothing in this context. You know that.


I am really not that interested in who makes the ingredients except to the extent that it determines what sort of cake emerges. One of the unexpected side effects of Web 2.0 has been that it has greatly centralized power in the hands of a tiny number of individuals. Individuals who are at best accountable to shareholders, but in the case of some of them, a separate share class ensures that they are accountable to nobody. In neither case are the people with power accountable to end users because they are not even customers, they are the product.

[Hannes] I believe the IETF is good at producing building blocks, has little experience in complete systems and no experience with building actual products. You are complaining about the products. You are blaming the wrong people.


What I am interested in is the extent to which Internet technologies are Technologies of Freedom. The question we need to ask ourselves is 'does this technology increase end user autonomy or increase their reliance on third parties'.

[Hannes] OAuth is flexible. You could use in your own personal data store and people have done that. Then, you are controlling everything. You can also setup a company to offer that service to others because there will be some users who do not want to run everything themselves.


I understand that some of the developments on the Internet are concerning and I share your concerns. If you believe OAuth is a reason for this development then I have to disagree with you.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.