Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-architecture-06.txt
John Bradley <ve7jtb@ve7jtb.com> Wed, 25 November 2015 20:02 UTC
Return-Path: <ve7jtb@ve7jtb.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0572B1B2F07 for <oauth@ietfa.amsl.com>; Wed, 25 Nov 2015 12:02:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level:
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GYT5DS7Tmrv3 for <oauth@ietfa.amsl.com>; Wed, 25 Nov 2015 12:02:24 -0800 (PST)
Received: from mail-qk0-x230.google.com (mail-qk0-x230.google.com [IPv6:2607:f8b0:400d:c09::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9787D1B2F10 for <oauth@ietf.org>; Wed, 25 Nov 2015 12:02:24 -0800 (PST)
Received: by qkas77 with SMTP id s77so20267034qka.0 for <oauth@ietf.org>; Wed, 25 Nov 2015 12:02:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ve7jtb-com.20150623.gappssmtp.com; s=20150623; h=content-type:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to; bh=fiprI5KCxM7wBBj4Txe7XzdDNJcXZPD6I15HTKmVwsU=; b=BeAt9HyOYPpuBHe5r4FKE03V+PLa/WVfmy9dstG/rMhBJlrIki3jbFEgCvZ5qg2svY JVnY7TiFwEGFYZD21MT0hq6xh6JHm3oRCuoMM0eugHj219HYcgsGP+5C8xDmS71bx1au jr1sjd56z4U05aoRQwc5E8cBe/iQAJH8kNS2T4vvNY3vwredTRKLakZXvcb07NPYTkGA c0lsWlp+R7l8EyTfOjeSmOj8YLqhtdgTeHlt33meMBCCosACyu2i+BpgpxsPQwTeRwU0 wvauqtMDFSBSefuwiNq81e35fjVa77RzhxJDiC/GQgH7DMNvUlrPcipBTTfFqxFOc+Ew kaaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=fiprI5KCxM7wBBj4Txe7XzdDNJcXZPD6I15HTKmVwsU=; b=QOUzY40HdC5VQuceAMgQLUZ3MsoMcEZTYN3X19nQ/LSWkeDFg44yNlj1VBpD4/o0X+ Ef0A4IoIADfZAWxequQruWc9J1seOjX/PES9kuo4CpaSakikZiDI3jKZTKSeZjBVTfHq UWQJ3yqPOSNQr3suw5Tt1Hrv4bQrkFkbD/zrzOq1lRsQgQCvmE/3N74zKiZY8njkghJ3 UpqVLf1FJdiUS14PQ7UWMQayDhn7za8kMs59NIsPFYX5/B3Kn2azQy7MBnOSqsfiJrcY 4lUr7Y74h9/PRdwq7Yzq/phCuqCEXXvevLBNUoSZEQbuzgVxXe1m51JQtB9DzE8q/fhl BHCw==
X-Gm-Message-State: ALoCoQm5USTEANETYydB3raTnkJtdEzF1QoqjpVtYXUK6KXId2qI2rHtMOywe0N8rNezpRkjSYfP
X-Received: by 10.55.42.27 with SMTP id q27mr41896646qkh.33.1448481743630; Wed, 25 Nov 2015 12:02:23 -0800 (PST)
Received: from [192.168.1.216] ([191.115.122.254]) by smtp.gmail.com with ESMTPSA id t103sm5371762qgd.12.2015.11.25.12.02.14 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 25 Nov 2015 12:02:22 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_84B27472-B2B5-4CCC-B660-285375F841DA"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\))
From: John Bradley <ve7jtb@ve7jtb.com>
In-Reply-To: <16FAD3AC-CFB8-46D5-A12E-436E902EA439@oracle.com>
Date: Wed, 25 Nov 2015 17:02:10 -0300
Message-Id: <C9F8F669-E091-4E81-82B6-B5AF1A52F922@ve7jtb.com>
References: <20151124200512.20833.28463.idtracker@ietfa.amsl.com> <F787FB76-5C8D-45F5-8A81-E430E75A0455@oracle.com> <CA+k3eCSeOyc2HMY+sK9rSjxkSAvNPWqwKyJNjDZAaCu2Stqk=w@mail.gmail.com> <16FAD3AC-CFB8-46D5-A12E-436E902EA439@oracle.com>
To: Phil Hunt <phil.hunt@oracle.com>
X-Mailer: Apple Mail (2.2104)
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/AfNMfW0S8un5kFxd8DvQYAOnaZE>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-architecture-06.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Nov 2015 20:02:28 -0000
The token is opaque to the client. It’s format is a matter between the RS and the AS. Where do we require the client verify the token? The RS is the only party that needs to verify the access token. The information that the client needs about the token is in additional meta-data delivered with but not in the AT. I agree with Brian that is wrong on two counts. 1) the token is opaque to the client. 2) one method of delivering the key to the RS is in a signed JWT. It is however also possible (if not ideal) for the AT to be a reference, and introspected by the RS to get the key. So "In contrast to bearer tokens [RFC6750] which call for tokens that are opaque to OAuth 2.0 clients, this specification defines the requirements for proof-of-possession ("PoP") tokens that may are also opaque to OAuth 2.0 clients but may be parsed and verified, or introspected by OAuth 2.0 Resource Servers. When token endpoints issue “PoP” tokens they provide the OAuth Client additional parameters with information on what key material to use for the proof.” Or given that they are both opaque that part of the statement could be dropped. John B. > On Nov 25, 2015, at 12:44 PM, Phil Hunt <phil.hunt@oracle.com> wrote: > > Except that later on we require the token be signed and the client verify that signed token. IOW mutual pop. > > Phil > > On Nov 25, 2015, at 07:30, Brian Campbell <bcampbell@pingidentity.com <mailto:bcampbell@pingidentity.com>> wrote: > >> Looking at the diff I noticed the following new text, which seems to conflate bearer/PoP and opaqueness to the client. A client demonstrating proof-of-possession of some key is orthogonal to the client being able to parse and understand the access token itself. >> >> "In contrast to bearer tokens [RFC6750] which call for tokens that are opaque to OAuth 2.0 clients, this specification defines the requirements for proof-of-possession ("PoP") tokens that may be parsed and verified by OAuth 2.0 clients and relying parties." >> >> On Tue, Nov 24, 2015 at 1:07 PM, Phil Hunt <phil.hunt@oracle.com <mailto:phil.hunt@oracle.com>> wrote: >> This draft addresses review comments from Kathleen and Erik raised since the last draft. >> >> It may not include some of the discussion from yesterday/today. I will add that as the group decides. >> >> Cheers, >> >> Phil >> >> @independentid >> www.independentid.com <http://www.independentid.com/> >> phil.hunt@oracle.com <mailto:phil.hunt@oracle.com> >> >> > On Nov 24, 2015, at 12:05 PM, internet-drafts@ietf.org <mailto:internet-drafts@ietf.org> wrote: >> > >> > >> > A New Internet-Draft is available from the on-line Internet-Drafts directories. >> > This draft is a work item of the Web Authorization Protocol Working Group of the IETF. >> > >> > Title : OAuth 2.0 Proof-of-Possession (PoP) Security Architecture >> > Authors : Phil Hunt >> > Justin Richer >> > William Mills >> > Prateek Mishra >> > Hannes Tschofenig >> > Filename : draft-ietf-oauth-pop-architecture-06.txt >> > Pages : 23 >> > Date : 2015-11-24 >> > >> > Abstract: >> > The OAuth 2.0 bearer token specification, as defined in RFC 6750, >> > allows any party in possession of a bearer token (a "bearer") to get >> > access to the associated resources (without demonstrating possession >> > of a cryptographic key). To prevent misuse, bearer tokens must be >> > protected from disclosure in transit and at rest. >> > >> > Some scenarios demand additional security protection whereby a client >> > needs to demonstrate possession of cryptographic keying material when >> > accessing a protected resource. This document motivates the >> > development of the OAuth 2.0 proof-of-possession security mechanism. >> > >> > >> > The IETF datatracker status page for this draft is: >> > https://datatracker.ietf.org/doc/draft-ietf-oauth-pop-architecture/ <https://datatracker.ietf.org/doc/draft-ietf-oauth-pop-architecture/> >> > >> > There's also a htmlized version available at: >> > https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-06 <https://tools.ietf.org/html/draft-ietf-oauth-pop-architecture-06> >> > >> > A diff from the previous version is available at: >> > https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-pop-architecture-06 <https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-pop-architecture-06> >> > >> > >> > Please note that it may take a couple of minutes from the time of submission >> > until the htmlized version and diff are available at tools.ietf.org <http://tools.ietf.org/>. >> > >> > Internet-Drafts are also available by anonymous FTP at: >> > ftp://ftp.ietf.org/internet-drafts/ <ftp://ftp.ietf.org/internet-drafts/> >> > >> > _______________________________________________ >> > OAuth mailing list >> > OAuth@ietf.org <mailto:OAuth@ietf.org> >> > https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth> >> >> _______________________________________________ >> OAuth mailing list >> OAuth@ietf.org <mailto:OAuth@ietf.org> >> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth> >> >> >> >> -- >> <https://www.pingidentity.com/> >> Brian Campbell >> Distinguished Engineer >> Ping Identity >> @ bcampbell@pingidentity.com <mailto:bcampbell@pingidentity.com> >> +1 720.317.2061 >> @pingidentity >> Connect with us! >> <https://www.pingidentity.com/> <https://www.pingidentity.com/> >> <https://ping.force.com/Support/PingIdentityCommunityHome> <https://ping.force.com/Support/PingIdentityCommunityHome> <http://www.glassdoor.com/Overview/Working-at-Ping-Identity-EI_IE380907.11,24.htm> <https://twitter.com/pingidentity> <https://www.youtube.com/user/PingIdentityTV> <https://www.linkedin.com/company/21870> <https://www.facebook.com/pingidentitypage> <https://plus.google.com/u/0/114266977739397708540> <http://www.slideshare.net/PingIdentity> <http://flip.it/vjBF7> <https://www.pingidentity.com/blogs/>_______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth
- [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-archi… internet-drafts
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Kathleen Moriarty
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Brian Campbell
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Brian Campbell
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Mike Jones
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Brian Campbell
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Brian Campbell
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Kathleen Moriarty
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Kathleen Moriarty
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Bill Mills
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Kathleen Moriarty
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Phil Hunt
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Justin Richer
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… John Bradley
- Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-pop-a… Kathleen Moriarty