Re: [OAUTH-WG] AD Review: draft-ietf-oauth-token-exchange-09

Brian Campbell <bcampbell@pingidentity.com> Fri, 19 January 2018 14:59 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F4D4120726 for <oauth@ietfa.amsl.com>; Fri, 19 Jan 2018 06:59:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4xgN2RZtCiRs for <oauth@ietfa.amsl.com>; Fri, 19 Jan 2018 06:59:31 -0800 (PST)
Received: from mail-it0-x22c.google.com (mail-it0-x22c.google.com [IPv6:2607:f8b0:4001:c0b::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A984120727 for <oauth@ietf.org>; Fri, 19 Jan 2018 06:59:31 -0800 (PST)
Received: by mail-it0-x22c.google.com with SMTP id q8so2413259itb.2 for <oauth@ietf.org>; Fri, 19 Jan 2018 06:59:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=gmail; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=HYsTtiDq7OriyU3AnNHrY3NBeze8UUuin3u3JZe2Tj4=; b=hOxSUdeNcmDKk5EpHFaiQnwl9asTU/Dvm5BdtO74XMVZtCjsSmeVudmfmUf9TcUxIH zf28ITrL4UTFGEnspvre362zvmxuu/mXJu/nQ2pPzLKa2cDLrSjcFi3AxmhC3RBXGFjb +TwDSHme9yNptx4wi3WhTjgD48GBXzjELoM2o=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=HYsTtiDq7OriyU3AnNHrY3NBeze8UUuin3u3JZe2Tj4=; b=JA581V+yUrAgLr1Aqc4C7O1T2jO13QjxUVwqwZdKPDcHayuNqi57WM3UD45fBzJjay mqf5FNsgeMQzZJKfWdW9PPV619PPQFXkUmg3wBcHO2DZOnmzo/Xu5TBry+IYJuljHGMr KMSc1Iz9k0yQBvVyt2y9roRzKFenmg6qX1gwHP5h4i7G/ACLuZVo3hifDV4s2RNoODVZ csKmsLS2ai2WkbfaV8IwYnJC4bw9pjYSiZk6h+/AUusJn8JZJva6udu/yEanZURpYbLS GBhwvQI5mZUz+qnTzAq7GDrJWVIgoAK2ARLI0lpJnA3CfFoHhHm5of8zxbfeEOWJ92cz E5nQ==
X-Gm-Message-State: AKwxytdm3WPWC7sK+oHIvS4B6t8B3lmkOxrFVDEoc+u+n5Bke6aJPHd4 DxH7pxVBVzET4kxkGRgii9X/qPol7s9o06OcPGAylZwtjZrRygeDoamM98z7iOFHjd7pIm8JHYU +w7K9W6cVlUnnww==
X-Google-Smtp-Source: ACJfBotDmJgFETIGmx7U2H0g7PU91ImNHDZ3ghJfD2n3g0odBx3kwe1ZuYxZGgtypAdlKWn5yVdtfB9nQc9N8/qRtLg=
X-Received: by 10.36.148.6 with SMTP id j6mr17185208ite.42.1516373970137; Fri, 19 Jan 2018 06:59:30 -0800 (PST)
MIME-Version: 1.0
Received: by 10.2.108.210 with HTTP; Fri, 19 Jan 2018 06:58:59 -0800 (PST)
In-Reply-To: <CY4PR21MB05046590C8F5889AB1AAA3C7F5050@CY4PR21MB0504.namprd21.prod.outlook.com>
References: <CABcZeBMWAKb1D_e3wRBSmYOiE64XbzLq6hzPO1GSEYOZ1dP6tw@mail.gmail.com> <CY4PR21MB05046590C8F5889AB1AAA3C7F5050@CY4PR21MB0504.namprd21.prod.outlook.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Fri, 19 Jan 2018 07:58:59 -0700
Message-ID: <CA+k3eCS0RkpOcX+80=H8GGfPs80A25BP9RG3XPWSSgRAwQmGwg@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: Eric Rescorla <ekr@rtfm.com>, "oauth@ietf.org" <oauth@ietf.org>, "draft-ietf-oauth-token-exchange@tools.ietf.org" <draft-ietf-oauth-token-exchange@tools.ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c0ef138d655b305632253b2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Em11kgBOpuGvSlaQXW7EweNro7c>
Subject: Re: [OAUTH-WG] AD Review: draft-ietf-oauth-token-exchange-09
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jan 2018 14:59:34 -0000

Yes, thank you for the review, Eric. A new draft -11 has been published
incorporating the feedback.

On Fri, Dec 29, 2017 at 10:48 AM, Mike Jones <Michael.Jones@microsoft.com>
wrote:

> Thanks for the useful review, Eric.  I’ll work with Brian and the crew to
> incorporate this feedback.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* OAuth [mailto:oauth-bounces@ietf.org] *On Behalf Of *Eric Rescorla
> *Sent:* Friday, December 29, 2017 8:41 AM
> *To:* oauth@ietf.org; draft-ietf-oauth-token-exchange@tools.ietf.org
> *Subject:* [OAUTH-WG] AD Review: draft-ietf-oauth-token-exchange-09
>
>
>
> Full-featured review at:
>
> https://mozphab-ietf.devsvcdev.mozaws.net/D4278
>
>
>
> As noted in inline comments, some additional words about the security
> model in which this document is embedded seem like they are needed. In
> particular, it's pretty unclear to me what checks the STS is supposed to do
> on a given request to determine whether to fulfill it. Where is that
> documented?
>
>
>
> *INLINE COMMENTS*
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1580>
> *draft-ietf-oauth-token-exchange.txt:129*
>
> securing access to HTTP and RESTful resources but do not provide
>
> everything necessary to facilitate token exchange interactions.
>
> Can you say a bit more about what is missing here?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1581>
> *draft-ietf-oauth-token-exchange.txt:265*
>
> REQUIRED. The value "urn:ietf:params:oauth:grant-type:token-
>
> exchange" indicates that a token exchange is being performed.
>
> I note that S 4.5. says that the grant_type is "defined by the
> authorization server" but that's not the case here, right?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1582>
> *draft-ietf-oauth-token-exchange.txt:268*
>
> resource
>
> OPTIONAL. Indicates the physical location of the target service
>
> or resource where the client intends to use the requested security
>
> Do you actually mean "physical" here? Presumably if it's a URI it's most
> likely a network address. I would take "physical" to mean "geographic"
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1583>
> *draft-ietf-oauth-token-exchange.txt:304*
>
> target services with a mix of logical names and physical
>
> locations.
>
> But it seems you can only specify one of each, right?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1584>
> *draft-ietf-oauth-token-exchange.txt:310*
>
> security token in the context of the service or resource where the
>
> token will be used.
>
> It's not clear to me where these values would come from. Can you expand on
> this?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1585>
> *draft-ietf-oauth-token-exchange.txt:341*
>
> REQUIRED when the "actor_token" parameter is present in the
>
> request but MUST NOT be included otherwise.
>
> It's not entirely clear to me from this text how these tokens authenticate
> the request. It's clear if they are bearer tokens, but if they are some
> sort of token over a public key, then how does that work.
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1586>
> *draft-ietf-oauth-token-exchange.txt:587*
>
> 2.0 [OASIS.saml-core-2.0-os] assertion, respectively. Other URIs to
>
> indicate other token types MAY be used.
>
> This feels like it would be better as some kind of list (maybe bulleted)?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1587>
> *draft-ietf-oauth-token-exchange.txt:666*
>
> it as the current actor and that can be used at
>
> https://backend.example.com.
>
> Where can I find the definitions of "iss" and "sub"?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1588>
> *draft-ietf-oauth-token-exchange.txt:689*
>
> response, "act" has the same semantics and format as the claim of the
>
> same name.
>
> It's not entirely clear to me how I'm supposed to evaluate these from an
> access control perspective.
>
> Is the assumption here that the entity producing the JWT has ensured the
> correct chain of issuers and subs?
>
> Is it the RP's job to evaluate whether each entity in the chain could have
> performed the action?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1589>
> *draft-ietf-oauth-token-exchange.txt:755*
>
> claims such as "exp", "nbf", and "aud" are not meaningful when used
>
> within a "may_act" claim, and therefore should not be used.
>
> I'm having a hard time understanding this claim. Can you provide an
> example to me (in email is fine, it doesn't need to be in the draft) of how
> it would be used?
>
>
>
> View Inline <https://mozphab-ietf.devsvcdev.mozaws.net/D4278#inline-1590>
> *draft-ietf-oauth-token-exchange.txt:1273*
>
> produced under the chairmanship of Hannes Tschofenig and Derek Atkins
>
> with Kathleen Moriarty and Stephen Farrell serving as Security Area
>
> Directors. The following individuals contributed ideas, feedback,
>
> You may want to update this
>
>
>
> *REPOSITORY*
>
> rIETFREVIEW ietf-review
>
>
>
> *REVISION DETAIL*
>
> https://mozphab-ietf.devsvcdev.mozaws.net/D4278
>
>
>
> *EMAIL PREFERENCES*
>
> https://mozphab-ietf.devsvcdev.mozaws.net/settings/panel/emailpreferences/
>
>
>
> *To: *ekr-moz, ekr
> *Cc: *ekr
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

-- 
*CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you.*