Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-revocation-10.txt

Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 29 June 2013 08:31 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C97D121F9E94 for <oauth@ietfa.amsl.com>; Sat, 29 Jun 2013 01:31:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.853
X-Spam-Level:
X-Spam-Status: No, score=-0.853 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, MIME_QP_LONG_LINE=1.396]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wfrKOo8mU-8D for <oauth@ietfa.amsl.com>; Sat, 29 Jun 2013 01:31:38 -0700 (PDT)
Received: from smtprelay06.ispgateway.de (smtprelay06.ispgateway.de [80.67.31.102]) by ietfa.amsl.com (Postfix) with ESMTP id DC33C21F9E93 for <oauth@ietf.org>; Sat, 29 Jun 2013 01:31:37 -0700 (PDT)
Received: from [79.253.61.13] (helo=[192.168.71.77]) by smtprelay06.ispgateway.de with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1UsqZC-0006el-KC; Sat, 29 Jun 2013 10:31:34 +0200
References: <20130616091345.2031.39661.idtracker@ietfa.amsl.com> <51BD8536.9010805@lodderstedt.net> <51CD9595.5020808@cs.tcd.ie>
Mime-Version: 1.0 (1.0)
In-Reply-To: <51CD9595.5020808@cs.tcd.ie>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Message-Id: <D9F0C7A3-201C-4DBD-A3C9-38D324558EDB@lodderstedt.net>
X-Mailer: iPad Mail (10B329)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Date: Sat, 29 Jun 2013 10:31:33 +0200
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-revocation-10.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Jun 2013 08:31:42 -0000

Hi Stephen,

Am 28.06.2013 um 15:54 schrieb Stephen Farrell <stephen.farrell@cs.tcd.ie>:

> 
> Hi,
> 
> On 06/16/2013 10:28 AM, Torsten Lodderstedt wrote:
>> Hi,
>> 
>> the new revision addresses DISCUSSES and comments raised during IESG
>> evaluation:
>> 
>> - DISCUSS by Barry Leiba: incoporated Barry's text proposal - it
>> strengthens requirements on the authorization server to immediately
>> revoke tokens while acknowledging the practical constraints on change
>> propagation among distributed servers
>> - D2 by Richard Barnes: changed text to refer to respective section of
>> RFC 6749 on TLS version
>> - description of revocation endpoint URL now refers to respective
>> section of RFC 6749 (comment by Sean Turner)
>> - added intro to IANA section (comment by Joel Jaeggli)
>> - some nits and editorial changes - should cover all comments raised
>> during IESG evaluation
>> 
>> There are two open issues
>> - discussion regarding the TLS version on the list
>> - DISCUSS regarding the mandate to use TLS (D1/Richard Barnes)
> 
> Can we please close these on the list so we don't have to
> spend time on 'em in Berlin?
> 
> As a reminder Richard's discuss says:
> 
> D1. The mandate for TLS usage actually seems backward here.  Suppose
> a server receives a request over HTTP.  At this point, the
> credentials have been exposed, so you would *want* the token to be
> invalidated!  Suggest: -- Clients MUST NOT send over HTTP -- Server
> revocation URIs MUST be HTTPS -- Servers MAY support HTTP to the
> corresponding URI, just in case the client screws up

If the server does not support HTTP (which is prohibited by the spec), the client cannot send the request over HTTP so there is no way to expose the token. I don't understand why the server should support HTTP.

> 
> D2. Why are the requirements TLS versions different here than in
> RFC 6749? Especially in a way that makes them worse.  Suggest
> deleting the sentence starting "The authorization server MUST
> support TLS 1.0 ..."

This is already fixed in -10.

Regards,
Torsten.

> 
> Thanks,
> S.
> 
> 
>> 
>> regards,
>> Torsten.
>> 
>> Am 16.06.2013 11:13, schrieb internet-drafts@ietf.org:
>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>> directories.
>>>  This draft is a work item of the Web Authorization Protocol Working
>>> Group of the IETF.
>>> 
>>>    Title           : OAuth 2.0 Token Revocation
>>>    Author(s)       : Torsten Lodderstedt
>>>                           Stefanie Dronia
>>>                           Marius Scurtescu
>>>    Filename        : draft-ietf-oauth-revocation-10.txt
>>>    Pages           : 11
>>>    Date            : 2013-06-16
>>> 
>>> Abstract:
>>>    This document proposes an additional endpoint for OAuth authorization
>>>    servers, which allows clients to notify the authorization server that
>>>    a previously obtained refresh or access token is no longer needed.
>>>    This allows the authorization server to cleanup security credentials.
>>>    A revocation request will invalidate the actual token and, if
>>>    applicable, other tokens based on the same authorization grant.
>>> 
>>> 
>>> 
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-oauth-revocation
>>> 
>>> There's also a htmlized version available at:
>>> http://tools.ietf.org/html/draft-ietf-oauth-revocation-10
>>> 
>>> A diff from the previous version is available at:
>>> http://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-revocation-10
>>> 
>>> 
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>> 
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> 
>>