Re: [OAUTH-WG] [EXTERNAL] Re: I-D Action: draft-ietf-oauth-jwsreq-21.txt

Mike Jones <Michael.Jones@microsoft.com> Tue, 28 April 2020 23:38 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4651B3A0980 for <oauth@ietfa.amsl.com>; Tue, 28 Apr 2020 16:38:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZRDQBaRZO9mO for <oauth@ietfa.amsl.com>; Tue, 28 Apr 2020 16:38:20 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650130.outbound.protection.outlook.com [40.107.65.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A87EC3A0975 for <oauth@ietf.org>; Tue, 28 Apr 2020 16:38:19 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eZSi+OLzBx2iNRV0hsbj+uUK4TaCL38tr21Ydbfr70dPyhRRi3iJrkuB8VpBJLgzUieKHcjs7CvbZ/VEGRpx9gREgKL1quG8l8+6jdQMmmUYzRgwjvWxsrl9it62a6GbwtfWom7QGHOiURzTKQ581SKggyIy/RCboGuqM+jC9ALPumIGP7o+5gkCg0MIAPfFf3/SdyokyYBgR2Z8lE2GuHP2gRqDFQ8pi2hr0LLo/AwW70Govj4k1Kf5NVHLD5r3XNY/xkNq3KffKUIYi+kBrmLX4URZ/iRwYkzpn/iVLI00DurWGYMbXVOl9x0fBj87aw/PxJpINw3fAEvM4ELJeA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Eh5LR3UnfD+HgoPx+ANEDccC6m4T84QmWb1IUvQ98ms=; b=isr8JHBceKFTmnDZSQeEee7DXer9RFreSxEs7kMKqLrZ0mQsUaHZy4DnkiOiO4I2/YFW1lVUnHWUZU7xxLOLZSp8zyPPfBLSl9rKDsZeI+YBTPkhgweOrtxVPWzGRyt1aTvRF2pLeCPSrDqIl8NbacYD5jB3uOXrxLtnT63KwgS4vgs6Hm5Blw1eVlzC+UVyvXhBmcDVHG5Pgd9Y1xo2lOWfrGp+GlVTYguH1HmA1RPq2Og8U8P834sLpXJPdcxcYAmxXNM0xnDXbL2+E7LhvedpXXzgRlyweVjULVvm+D9sZ6LGLyHrku4ePpf4pT+Ua2/01lkQK+vXdL3+EDpBbg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Eh5LR3UnfD+HgoPx+ANEDccC6m4T84QmWb1IUvQ98ms=; b=KfMlc9xmsKWTTbImTgDxOwIfjYF6I8bA//rRoys3rXQLWsrvpM+ZADHxvZAjF1pAYbBUadUDGaiNYH3h0CzpEUOuYweFtG1n3Fd9QiSqih/5r3jW/nshpXQmkWF63J+4PhyKhB4avoK/6I5miIWunbrdRpNnrH3oUkRdjitcec0=
Received: from BY5PR00MB0676.namprd00.prod.outlook.com (2603:10b6:a03:20c::15) by BYAPR00MB0454.namprd00.prod.outlook.com (2603:10b6:a03:d9::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2988.0; Tue, 28 Apr 2020 23:38:16 +0000
Received: from BY5PR00MB0676.namprd00.prod.outlook.com ([fe80::2c69:97fa:f3be:7b60]) by BY5PR00MB0676.namprd00.prod.outlook.com ([fe80::2c69:97fa:f3be:7b60%7]) with mapi id 15.20.2996.000; Tue, 28 Apr 2020 23:38:16 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Nat Sakimura <nat@sakimura.org>, Torsten Lodderstedt <torsten=40lodderstedt.net@dmarc.ietf.org>, John Bradley <jbradley@yubico.com>
CC: oauth <oauth@ietf.org>
Thread-Topic: [EXTERNAL] Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-jwsreq-21.txt
Thread-Index: AdYb7ny/PQDH7dVXRBSZpdWvw5uEuwAAbaAAAHFtauA=
Date: Tue, 28 Apr 2020 23:38:15 +0000
Message-ID: <BY5PR00MB0676CBF29BE43390EBB459C4F5AC0@BY5PR00MB0676.namprd00.prod.outlook.com>
References: <CH2PR00MB06798A6DCC36BD152F324155F5AE0@CH2PR00MB0679.namprd00.prod.outlook.com> <88d7c433-bd4b-456a-bc04-d30ed988fe9f@Spark>
In-Reply-To: <88d7c433-bd4b-456a-bc04-d30ed988fe9f@Spark>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=f3a7090f-b4a1-4b7c-9f9b-00007213443f; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-04-28T23:36:59Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: sakimura.org; dkim=none (message not signed) header.d=none; sakimura.org; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [50.47.87.252]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 5c1685e1-af46-4002-25cd-08d7ebcd3999
x-ms-traffictypediagnostic: BYAPR00MB0454:
x-microsoft-antispam-prvs: <BYAPR00MB04546F4392FFF91397FD5582F5AC0@BYAPR00MB0454.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0387D64A71
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR00MB0676.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(346002)(396003)(39860400002)(366004)(136003)(9686003)(26005)(21615005)(66574012)(55016002)(316002)(53546011)(71200400001)(8676002)(5660300002)(110136005)(8990500004)(6506007)(86362001)(8936002)(186003)(4326008)(478600001)(52536014)(2906002)(10290500003)(7696005)(966005)(66946007)(82950400001)(66476007)(66446008)(66556008)(33656002)(76116006)(64756008)(82960400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BY5PR00MB0676CBF29BE43390EBB459C4F5AC0BY5PR00MB0676namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR00MB0676.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5c1685e1-af46-4002-25cd-08d7ebcd3999
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Apr 2020 23:38:16.1045 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EdK8RQNYP2M0o8+bXHlEV8Z3Jqf4uYrl4abn9o2UdfU7awPYbIv7GAt6VsjmU+n1YyaUvvgxENm/3QtKevkOKg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR00MB0454
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/PCmG8Bx2a3JYxIsK_2KU4jGTAJQ>
Subject: Re: [OAUTH-WG] [EXTERNAL] Re: I-D Action: draft-ietf-oauth-jwsreq-21.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Apr 2020 23:38:22 -0000

“request_object_signing_alg_values_supported” and other AS Metadata values defined by OpenID Connect Discovery are now registered at https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata.

                                                          -- Mike

From: nat=sakimura.org@mg.sakimura.org <nat=sakimura.org@mg.sakimura.org> On Behalf Of Nat Sakimura
Sent: Sunday, April 26, 2020 10:29 AM
To: Torsten Lodderstedt <torsten=40lodderstedt.net@dmarc.ietf.org>rg>; John Bradley <jbradley@yubico.com>om>; Mike Jones <Michael.Jones@microsoft.com>
Cc: oauth <oauth@ietf.org>
Subject: [EXTERNAL] Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-jwsreq-21.txt

Thanks Mike.

Right in as much as I never expected JAR to take this long, I was expecting the errata to be published and these params to be registered long before as well :-) But it may be a good sign that we Identiterati are all so busy these days.

Nat Sakimura
Chairman, OpenID Foundation
https://nat.sakimura.org
2020年4月27日 2:17 +0900、Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> のメール:

The next errata version of OpenID Connect Discovery will register the parameter request_object_signing_alg_values_supported and other parameters not previously registered. See https://openid.net/specs/openid-connect-discovery-1_0-29.html for the latest published errata draft.

I can make a request for early registration if it would be useful.

-- Mike

-----Original Message-----
From: OAuth <oauth-bounces@ietf.org<mailto:oauth-bounces@ietf.org>> On Behalf Of Torsten Lodderstedt
Sent: Sunday, April 26, 2020 8:17 AM
To: Nat Sakimura <nat@sakimura.org<mailto:nat@sakimura.org>>; John Bradley <jbradley@yubico.com<mailto:jbradley@yubico.com>>
Cc: oauth <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-jwsreq-21.txt

Hi Nat & John,

I tried to find out how signing & encryption algorithms are determined in the JAR context.

I just found this note in the history for -07: "Stopped talking about request_object_signing_alg”

I assume you assume this is done via client registration parameters registered in https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#client-metadata? Why doesn’t JAR state so?

What is about algorithms supported by the AS? The respective parameters, such as request_object_signing_alg_values_supported are not registered yet in https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml#authorization-server-metadata.

best regards,
Torsten.



On 19. Apr 2020, at 20:30, internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> wrote:


A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Web Authorization Protocol WG of the IETF.

Title : The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)
Authors : Nat Sakimura
John Bradley
Filename : draft-ietf-oauth-jwsreq-21.txt
Pages : 31
Date : 2020-04-19

Abstract:
The authorization request in OAuth 2.0 described in RFC 6749 utilizes
query parameter serialization, which means that Authorization Request
parameters are encoded in the URI of the request and sent through
user agents such as web browsers. While it is easy to implement, it
means that (a) the communication through the user agents are not
integrity protected and thus the parameters can be tainted, and (b)
the source of the communication is not authenticated. Because of
these weaknesses, several attacks to the protocol have now been put
forward.

This document introduces the ability to send request parameters in a
JSON Web Token (JWT) instead, which allows the request to be signed
with JSON Web Signature (JWS) and encrypted with JSON Web Encryption
(JWE) so that the integrity, source authentication and
confidentiality property of the Authorization Request is attained.
The request can be sent by value or by reference.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-oauth-jwsreq/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-21
https://datatracker.ietf.org/doc/html/draft-ietf-oauth-jwsreq-21

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-oauth-jwsreq-21


Please note that it may take a couple of minutes from the time of
submission until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth