Re: [OAUTH-WG] [Openid-specs-ab] OAuth Security Topics -- Recommend authorization code instead of implicit

n-sakimura <n-sakimura@nri.co.jp> Wed, 28 November 2018 00:56 UTC

Return-Path: <n-sakimura@nri.co.jp>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2193C12875B for <oauth@ietfa.amsl.com>; Tue, 27 Nov 2018 16:56:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.698
X-Spam-Level:
X-Spam-Status: No, score=-1.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nri365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M0zF-55jKsvK for <oauth@ietfa.amsl.com>; Tue, 27 Nov 2018 16:56:18 -0800 (PST)
Received: from nrifs02.index.or.jp (nrigw01.index.or.jp [133.250.250.1]) by ietfa.amsl.com (Postfix) with ESMTP id E914F12F18C for <oauth@ietf.org>; Tue, 27 Nov 2018 16:56:17 -0800 (PST)
Received: from nrimmfm052.index.or.jp (unknown [172.19.246.144]) by nrifs02.index.or.jp (Postfix) with ESMTP id F01A5196864; Wed, 28 Nov 2018 09:56:16 +0900 (JST)
Received: from index.or.jp (unknown [172.19.246.151]) by nrimmfm052.index.or.jp (Postfix) with ESMTP id 7F1564E0046; Wed, 28 Nov 2018 09:56:16 +0900 (JST)
Received: from nriea04.index.or.jp (localhost.localdomain [127.0.0.1]) by pps.mf051 (8.15.0.59/8.15.0.59) with SMTP id wAS0uGQM012692; Wed, 28 Nov 2018 09:56:16 +0900
Received: from nrims00b.nri.co.jp ([192.50.135.12]) by nriea04.index.or.jp with ESMTP id wAS0uGfT012691; Wed, 28 Nov 2018 09:56:16 +0900
Received: from nrims00b.nri.co.jp (localhost.localdomain [127.0.0.1]) by nrims00b.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id wAS0uIjU054865; Wed, 28 Nov 2018 09:56:18 +0900
Received: (from mailnull@localhost) by nrims00b.nri.co.jp (Switch-3.3.4/Switch-3.3.0/Submit) id wAS0uI9Q054864; Wed, 28 Nov 2018 09:56:18 +0900
X-Authentication-Warning: nrims00b.nri.co.jp: mailnull set sender to n-sakimura@nri.co.jp using -f
Received: from nrizmf15.index.or.jp ([172.100.25.24]) by nrims00b.nri.co.jp (Switch-3.3.4/Switch-3.3.4) with ESMTP id wAS0uIrd054861; Wed, 28 Nov 2018 09:56:18 +0900
Received: from CUEXE02PA.cu.nri.co.jp (192.51.23.32) by CUEXM09PA.cu.nri.co.jp (172.159.253.51) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Wed, 28 Nov 2018 09:56:14 +0900
Received: from JPN01-OS2-obe.outbound.protection.outlook.com (23.103.139.152) by ex.nri.co.jp (192.51.23.33) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Wed, 28 Nov 2018 09:56:14 +0900
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nri365.onmicrosoft.com; s=selector1-cu-nri-co-jp; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TDH8lg+MkTnJzZrx2q1qjkAIijzAQeQm3q0ow81HaVs=; b=VLtv+xiEQdR0YZ3mP80K1cKm1WcckDLMw1CN1vgRIF7gke182v6pI7lKySkRpj0qR/eJ7CbNkOkFtAFqT0C+h99bdrrZo53vJ/6bj2V3RG2AYMX/u01KMoZY5DZUAgQMiw/M+JBmCxgeM9GgQJEWB7yGHXklR+IHAksop5hF79Y=
Received: from OSBPR01MB2869.jpnprd01.prod.outlook.com (52.134.253.15) by OSBPR01MB3110.jpnprd01.prod.outlook.com (52.134.254.213) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1361.20; Wed, 28 Nov 2018 00:56:13 +0000
Received: from OSBPR01MB2869.jpnprd01.prod.outlook.com ([fe80::d1ae:ff36:e681:ce6c]) by OSBPR01MB2869.jpnprd01.prod.outlook.com ([fe80::d1ae:ff36:e681:ce6c%4]) with mapi id 15.20.1294.045; Wed, 28 Nov 2018 00:56:13 +0000
From: n-sakimura <n-sakimura@nri.co.jp>
To: Tom Jones <thomasclinganjones@gmail.com>, Nat Sakimura <n-sakimura@nri.co.jp>
CC: Artifact Binding/Connect Working Group <openid-specs-ab@lists.openid.net>, "oauth@ietf.org" <oauth@ietf.org>, "jim@manicode.com" <jim@manicode.com>
Thread-Topic: [Openid-specs-ab] [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit
Thread-Index: AQHUhmmvazGUOUu3zUW6qxGAce3IH6VjxxqAgAA7dICAAAaRgIAACXuAgAACdACAAAdoAIAAIAUAgAAE5YCAAAYKAIAAClWAgAAIjOA=
Date: Wed, 28 Nov 2018 00:56:13 +0000
Message-ID: <OSBPR01MB286966400838D4CD0CE0214DF9D10@OSBPR01MB2869.jpnprd01.prod.outlook.com>
References: <VI1PR0801MB211266BA6F6E06FFB3081425FAD80@VI1PR0801MB2112.eurprd08.prod.outlook.com> <5494f764-2d14-089a-8fe8-132a65e32d5e@manicode.com> <8935ff0f-aeab-c773-5e2d-6fedcc29119d@connect2id.com> <CABzCy2D0JAr-C1-jTcodpBdoUNx1We3JDg-PMcsOBL1Ga_m-Hw@mail.gmail.com> <2297d085-28f2-15dd-6dba-937dce9f2122@manicode.com> <CABzCy2AW0dvmEqfHgd=-ULdYSxnUXwrz6jiCBpKw7MQSu-YFbA@mail.gmail.com> <327B68FD-9449-4809-A3B8-BC79C5B1D42C@lodderstedt.net> <CAANoGhK9cYS8NFrpwczVsifz7pdraqOZpBoDHFZkg_qKdj4Vqg@mail.gmail.com> <E7BA53F0-B925-4C47-9C41-CFBC0EB36D18@lodderstedt.net> <99e3a87e-1904-b756-d3c2-936ea5bb5b6e@ve7jtb.com> <02FFD6C6-1EDB-460D-BB6E-7975362DD377@lodderstedt.net> <CABzCy2C0QYXjyN_ZBLiqi9KZ+OKB2sZLkjjPVpYuZ8Lb8C__Xw@mail.gmail.com> <CAK2Cwb5k8jDe-6YRVRg5OSLTV_d7MBbqWrsiD1FSSshxwZcMYQ@mail.gmail.com> <OSBPR01MB286955E2DF450308CE63EED0F9D00@OSBPR01MB2869.jpnprd01.prod.outlook.com> <CAK2Cwb5RFr13d8wdtXzkieCCo-3h5hmSEfKeUpaCT=-aGQ1HbQ@mail.gmail.com>
In-Reply-To: <CAK2Cwb5RFr13d8wdtXzkieCCo-3h5hmSEfKeUpaCT=-aGQ1HbQ@mail.gmail.com>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailadviser: 20170719
authentication-results: spf=none (sender IP is ) smtp.mailfrom=n-sakimura@cu.nri.co.jp;
x-originating-ip: [37.71.28.34]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; OSBPR01MB3110; 6:oho/V3pUs8VoBMKyMcn78oXxeH3zeT5c3ECJZae6lFGIzp/SSw8mfUkKccubav3ZliyhAUsmKSK4/v9IsiAd3LqPBJ8RHjLAAsGKy7zSwXqs3rMoiJoPIB2WzwFP/aKF+MrSEmIWPJJ4vub3hWwkhLrsqG0/mRUrph3ZnWHW0U4logbwbrfqy8v+FpmV5lHl8HAMeOWz9n/tlEaZDNOhASs3atWAQvj1Yo28X8Tsy6sZd3CWNLRaYXRcX3Mmgp1GL2mTbb/y5AIZRn3QgunjieEKAU4cm2Rnh1FbF29WeoG5qsfOIp5joWchgp09YFwRJuSQxn/4nMUA80ZCSN6GIFWxRyfiTn+axWP08p+A0Ix5xXAnL8vQyGujzyVKqJl5667psHoYvOohaZJrlGXlo6HO6LC2Kb3djru2GS7fCJPUka/QnJUMq5NbhXwVoom+umyLQo51T6cmhS5qas7u3g==; 5:3mmpiuBg/KC2M1OUTSdeF771JUwd4nHuDHpKGkOguxqr6F6RzWy5gB6uLGIhDeE+ANcXygj6qNJZhEPuQ7KZvk2NqPeV4KhmtqiYHC/RbPSi9UsPXw2MIxpPhsFYY+jMfSmDJTAOKoFehnYNSV+daVjzUMa1rehqcO8FFN4LNkE=; 7:/TROIVwObKenykS98Ai4mNKB4Yqle3iTNmaOKdcO6RmWxkr2sJWAsez+2bugV5rnp4N2xGuxtIkaQCC0+XwwPHlgjkBTZnkI9s33WIUw0HMzZpBvRxcOi2vZF2B2hxVfvrP3taiCKp8GX1OkD2fGjg==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: db25075d-f124-42b3-eb0d-08d654cc4b6a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(7021145)(8989299)(5600074)(711020)(4534185)(7022145)(4603075)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(2017052603328)(7153060)(7193020); SRVR:OSBPR01MB3110;
x-ms-traffictypediagnostic: OSBPR01MB3110:
x-microsoft-antispam-prvs: <OSBPR01MB3110BF2C3032174CFD99BFC7F9D10@OSBPR01MB3110.jpnprd01.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231443)(944501410)(4982022)(52105112)(93006095)(93001095)(3002001)(10201501046)(148016)(149066)(150057)(6041310)(2016111802025)(20161123560045)(20161123564045)(20161123562045)(20161123558120)(6043046)(201708071742011)(7699051)(76991095); SRVR:OSBPR01MB3110; BCL:0; PCL:0; RULEID:; SRVR:OSBPR01MB3110;
x-forefront-prvs: 0870212862
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(366004)(136003)(39840400004)(376002)(396003)(365934003)(189003)(199004)(86362001)(7110500001)(551544002)(74316002)(4326008)(68736007)(606006)(508600001)(76176011)(39060400002)(316002)(186003)(25786009)(5660300001)(71190400001)(53546011)(6506007)(71200400001)(4744004)(66574009)(26005)(93886005)(7736002)(561944003)(10710500007)(102836004)(11346002)(66066001)(53946003)(2906002)(476003)(229853002)(14444005)(53936002)(14454004)(256004)(446003)(6116002)(6436002)(3846002)(33656002)(790700001)(236005)(15650500001)(486006)(2420400007)(9686003)(6306002)(54896002)(74482002)(55016002)(8676002)(7696005)(97736004)(6246003)(966005)(81156014)(81166006)(106356001)(110136005)(53376002)(8936002)(105586002)(99286004)(54906003); DIR:OUT; SFP:1102; SCL:1; SRVR:OSBPR01MB3110; H:OSBPR01MB2869.jpnprd01.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:0;
received-spf: None (protection.outlook.com: cu.nri.co.jp does not designate permitted sender hosts)
x-microsoft-antispam-message-info: fkr8WlQA9nV/3XB3u6BlWWX7s6OLbSL38g1dYWyiPc1rT7tYuwqyYsrOj0P2ws5e6RlrkdpT2rAnNFA0AFiHdvt+WCUkEZf7+onoZRKVkcFl1wpylVnIBSoEJYShMb4knfutg1WmAKrdpj6r/eBgS5GYA81qA+iG1o14AV9+T15fyVr2UkEuI/52e6gTv+0zts5BTefHr+OZjlQxdyXJGstV6V3hJEzqfH93RwD1mgTT4CLI9FjjMuWrGnhhJqRaEFI+u+zPLngiavzv8bEx6nd9v41B+wx9X1qEzeVaDrqBggeChrb9pfk/ujDBTbJLLmsyWFhsc/sU7sy0kw4tr6PZMHrvz5zOxzVxSdzVR28=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_OSBPR01MB286966400838D4CD0CE0214DF9D10OSBPR01MB2869jpnp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: db25075d-f124-42b3-eb0d-08d654cc4b6a
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Nov 2018 00:56:13.3222 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: e3e360d9-7e7f-48d5-ac33-3c5de61f0a75
X-MS-Exchange-Transport-CrossTenantHeadersStamped: OSBPR01MB3110
X-OrganizationHeadersPreserved: OSBPR01MB3110.jpnprd01.prod.outlook.com
X-CrossPremisesHeadersPromoted: CUEXE02PA.cu.nri.co.jp
X-CrossPremisesHeadersFiltered: CUEXE02PA.cu.nri.co.jp
X-OriginatorOrg: cu.nri.co.jp
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/7cssXOyPaAj7Ub4kT3vf8umjYP4>
Subject: Re: [OAUTH-WG] [Openid-specs-ab] OAuth Security Topics -- Recommend authorization code instead of implicit
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Nov 2018 00:56:23 -0000

Not really.

It is not a requirement of SIOP to leverage the device’s secure element to create key-pairs. So, the keys can be exported and ported to other devices as well. There could be key syncing mechanism as well, like 1password, but it is not standardized.

Re: discovery
In the use-case of SIOP, from the client’s point of view, SIOP is always in the user’s device, i.e., localhost. So, there is no need for discovery.

Having said that: SIOP spec is a bit old and depends on custom scheme on iOS. Now iOS has newer capability like claimed URI, which is more secure. So, having a discovery mechanism that returns  [Self-issued Identifier – device type – claimed URI] triple kind of thing may be useful. (Note, I just came up with it now and it’s 2 AM here so it may be a bad idea after all.)


Nat Sakimura <n-sakimura@nri.co.jp<mailto:n-sakimura@nri.co.jp>>

PLEASE READ :This e-mail is confidential and intended for the named recipient only. If you are not an intended recipient, please notify the sender and delete this e-mail.



From: Tom Jones <thomasclinganjones@gmail.com>
Sent: Wednesday, November 28, 2018 9:14 AM
To: Nat Sakimura <n-sakimura@nri.co.jp>
Cc: Artifact Binding/Connect Working Group <openid-specs-ab@lists.openid.net>; oauth@ietf.org; jim@manicode.com
Subject: Re: [Openid-specs-ab] [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

I see, so then the self-issued ID is device-locked? it sounds more like a device ID than a user ID.  Which is useful, but not too helpful in a multiple device world. The screen i am using right now has 3 devices driving it in one form or another. Is there any way that a self-issued ID of this form can be made useful in today's world?  BTW - i like the idea of URN's rather than URL's, but some resolver capability seems to be a requirement?
Peace ..tom


On Tue, Nov 27, 2018 at 3:50 PM n-sakimura <n-sakimura@nri.co.jp<mailto:n-sakimura@nri.co.jp>> wrote:
Tom,

It is good to hear that you will be there.
I understand John will also be there.

To your question, self-issued ID does not require a (semi-)permanent URL as the user’s identifier, as it is always “localhost”.
The identifier is derived as the hash of the public key that was generated by the Self-issued OP.
If your question was “URI”, then yes. Its issuer is always https://self-issued.me and there is a `sub` for that identity, so synthesized URI for the user would be something like https://self-issued.me/{sub}<https://self-issued.me/%7bsub%7d> where {sub} represents the value of the `sub` claim. `sub` claim value is defined as follows:

sub (subject) Claim value is the base64url encoded representation of the thumbprint of the key in the sub_jwk Claim. This thumbprint value is computed as the SHA-256 hash of the octets of the UTF-8 representation of a JWK constructed containing only the REQUIRED members to represent the key, with the member names sorted into lexicographic order, and with no white space or line breaks. For instance, when the kty value is RSA, the member names e, kty, and n are the ones present in the constructed JWK used in the thumbprint computation and appear in that order; when the kty value is EC, the member names crv, kty, x, and y are present in that order. Note that this thumbprint calculation is the same as that defined in the JWK Thumbprint [JWK.Thumbprint]Jones, M., “JSON Web Key (JWK) Thumbprint,” July 2014.<https://openid.net/specs/openid-connect-core-1_0.html#JWK.Thumbprint> specification.

So, yes. The string https://self-issued.me/{sub}<https://self-issued.me/%7bsub%7d> is probabilistically unique and “persistent” (better to phrase it as ‘never re-assigned’).

The reason it is not a “URL” is that you cannot reach it. However, It is a “URI”.

Cheers,


Nat Sakimura <n-sakimura@nri.co.jp<mailto:n-sakimura@nri.co.jp>>

PLEASE READ :This e-mail is confidential and intended for the named recipient only. If you are not an intended recipient, please notify the sender and delete this e-mail.



From: Openid-specs-ab <openid-specs-ab-bounces@lists.openid.net<mailto:openid-specs-ab-bounces@lists.openid.net>> On Behalf Of Tom Jones via Openid-specs-ab
Sent: Wednesday, November 28, 2018 8:16 AM
To: Artifact Binding/Connect Working Group <openid-specs-ab@lists.openid.net<mailto:openid-specs-ab@lists.openid.net>>
Cc: Tom Jones <thomasclinganjones@gmail.com<mailto:thomasclinganjones@gmail.com>>; oauth@ietf.org<mailto:oauth@ietf.org>; jim@manicode.com<mailto:jim@manicode.com>
Subject: Re: [Openid-specs-ab] [OAUTH-WG] OAuth Security Topics -- Recommend authorization code instead of implicit

I am headed to a w3c meeting that will talk about DIDs for the future. I would like to understand if the self-issued ID requires (or should require) some sort of (semi) permanent URL on the internet. (including on a block-chain, for example.)  Without that i cannot understand what a self-issued ID might even mean.

Peace ..tom


On Tue, Nov 27, 2018 at 3:06 PM Nat Sakimura via Openid-specs-ab <openid-specs-ab@lists.openid.net<mailto:openid-specs-ab@lists.openid.net>> wrote:
Self Issued OP is described in Chapter 7 of the OpenID Connect Core 1.0.
It lives on a local machine, typically a phone. Even if it did provide an authorization code to the client, the client cannot establish a direct connection to the local machine (phone) as it is not addressable. Therefore, a token endpoint cannot be provided unless it is coupled with some kind of cloud-based service, which would negate some of the very reason for having the Self-issued OP. In other words, only the viable communication channel between the SIOP and the client is the front channel. The situation could be true to other "wallet" type of implementations.

This is one of the exotic features of OpenID Connect that never got a traction but it is getting a renewed interest as "Self-sovereign Identity" gained some interest.



On Wed, Nov 28, 2018 at 6:03 AM Torsten Lodderstedt <torsten@lodderstedt.net<mailto:torsten@lodderstedt.net>> wrote:
I still don’t understand why the use case must be solved using a flow issuing something in the front channel.

I would also like to take a closer look. Can you or Nat provide pointers to existing implementations?

> Am 27.11.2018 um 21:36 schrieb John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jtb.com>>:
>
> I understand that, but hat is Nat's concern as I understand it.
>
> When we say no implicit people, have a problem because implicit is imprecise.
>
> We are saying no AT returned in the response from the authorization endpoint.
>
> Nat points out that id_token may contain AT for the self issued client.
>
> So unless we say that is OK if the AT are sender constrained we wind up implying that a OpenID profile of OAuth is in violation of the BCP.
>
> I am just trying to make sure everyone is on the same page with why Nat was -1.
>
> It really has nothing to do with the SPA use case.
>
> John B.
>
>> On 11/27/2018 5:28 PM, Torsten Lodderstedt wrote:
>> Hi John,
>>
>> as you said, self issued IDPs (https://openid.net/specs/openid-connect-core-1_0.html#SelfIssued) are supposed to provide the response type „id_token“ only. I don’t think the proposal being discussed here is related to this OIDC mode.
>>
>> best regards,
>> Torsten.
>>
>>> Am 27.11.2018 um 20:54 schrieb John Bradley <ve7jtb@ve7jtb.com<mailto:ve7jtb@ve7jtb.com>>:
>>>
>>> I talked to Nat about this a bit today.
>>>
>>> The thing he is concerned about is mostly around the self issued IDP that doesn't have a token endpoint(atleast not easaly).
>>>
>>> The main use case for that is the id_token response type where claims are retuned in the id_token.
>>>
>>> Because it is fragment encoded some people call that implicit.   That is not what we are trying to stop.
>>>
>>> In some cases in that flow there may be distributed claims returned with access Token inside the id_token.    I think most people would agree that those should be pop or sender constrained tokens.
>>>
>>> In the case of self issued the RP would be a server and could do sender constrained via some mechinisim that is yet to be defined.
>>>
>>> So if someone wanted to return a access token in a id_token to do distributed claims I don't think we have a problem with that as long as the token is protected by being sender constrained in some reasonable way.
>>>
>>> This is a touch hypothetical from the basic OAuth perspective, so I don't know how deep we want to go into it.
>>>
>>> I think the point is not to accidently prohibit something that could be done in future.
>>>
>>> I also think we should not conflate confidential clients that can authenticate to the token endpoint with sender constrained/PoP clients that can deal with bound tokens.   Yes both have keys but it is better to describe them separately.
>>>
>>> John B.
>>>
>>> On Tue, Nov 27, 2018, 4:30 PM Torsten Lodderstedt via Openid-specs-ab <openid-specs-ab@lists.openid.net<mailto:openid-specs-ab@lists.openid.net> wrote:
>>> Hi Nat,
>>>
>>> I understand you are saying your draft could provide clients with an application level mechanism to sender constrain access tokens. That’s great!
>>>
>>> But I don’t see a binding to response type „token id_token“. Why do you want to expose the tokens via the URL to attackers?
>>>
>>> You could easily use your mechanism with code. That would also give you the chance to really authenticate the confidential client before you issue the token.
>>>
>>> kind regards,
>>> Torsten.
>>>
>>>> Am 27.11.2018 um 16:57 schrieb Nat Sakimura <sakimura@gmail.com<mailto:sakimura@gmail.com>>:
>>>>
>>>> I am not talking about SPA.
>>>> The client is a regular confidential client that is running on a server.
>>>>
>>>> Best,
>>>>
>>>> Nat Sakimura
>>>>
>>>>
>>>> 2018年11月27日(火) 16:55 Jim Manico <jim@manicode.com<mailto:jim@manicode.com>>:
>>>> Nat,
>>>>
>>>> How is proof of possession established in a modern web browser in the implicit flow?
>>>>
>>>> My understanding is that token binding was removed from Chrome recently effectively killing browser-based PoP tokens.
>>>>
>>>> https://identiverse.com/2018/10/31/chrome-puts-token-binding-in-a-bind/
>>>>
>>>> Am I missing something?
>>>>
>>>> Aloha, Jim
>>>>
>>>>
>>>>
>>>>> On 11/27/18 9:00 PM, Nat Sakimura wrote:
>>>>> I am actually -1.
>>>>>
>>>>> +1 for public client and the tokens that are not sender/key constrained.
>>>>>
>>>>> Just not being used right now does not mean that it is not useful.. In fact, I see it coming.
>>>>> Implicit (well, Hybrid “token id_token” really) is very useful in certain cases.
>>>>> Specifically, when the client is confidential (based on public key pair), and uses sender constrained (key-constrained) token such as the one explained in https://tools.ietf.org/html/draft-sakimura-oauth-jpop-04#section-5, it is very useful.
>>>>> (Key-constrained token is the remaining portion of this draft that did not get incorporated in the MTLS draft. )
>>>>> In fact it is the only viable method for Self-Issued OpenID Provider.
>>>>>
>>>>> So, the text is generally good but it needs to be constrained like “Unless the client is confidential and the access token issued is key constrained, ... “
>>>>>
>>>>> Best,
>>>>>
>>>>> Nat Sakimura
>>>>>
>>>>>
>>>>> 2018年11月27日(火) 16:01 Vladimir Dzhuvinov <vladimir@connect2id.com<mailto:vladimir@connect2id.com>>:
>>>>> +1 to recommend the deprecation of implicit.
>>>>>
>>>>> I don't see a compelling reason to keep implicit when there is an
>>>>> established alternative that is more secure.
>>>>>
>>>>> Our duty as WG is to give developers the best and most sensible practice.
>>>>>
>>>>> CORS adoption is currently at 94% according to
>>>>> https://caniuse.com/#feat=cors
>>>>>
>>>>> Vladimir
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> --
>>>>> Nat Sakimura (=nat)
>>>>> Chairman, OpenID Foundation
>>>>> http://nat..sakimura.org/<http://sakimura.org/>
>>>>> @_nat_en
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>>
>>>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>> --
>>>> Jim Manico
>>>> Manicode Security
>>>>
>>>> https://www.manicode.com
>>>> --
>>>> Nat Sakimura (=nat)
>>>> Chairman, OpenID Foundation
>>>> http://nat.sakimura.org/
>>>> @_nat_en
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org<mailto:OAuth@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> Openid-specs-ab mailing list
>>> Openid-specs-ab@lists.openid.net<mailto:Openid-specs-ab@lists.openid.net>
>>> http://lists.openid.net/mailman/listinfo/openid-specs-ab


--
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
Openid-specs-ab mailing list
Openid-specs-ab@lists.openid.net<mailto:Openid-specs-ab@lists.openid.net>
http://lists.openid.net/mailman/listinfo/openid-specs-ab