Re: [OAUTH-WG] Dynamic clients, URI, and stuff Re: Discussion needed on username and password ABNF definitions

William Mills <wmills@yahoo-inc.com> Wed, 13 June 2012 15:07 UTC

Return-Path: <wmills@yahoo-inc.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 002AE21F84FE for <oauth@ietfa.amsl.com>; Wed, 13 Jun 2012 08:07:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.426
X-Spam-Level:
X-Spam-Status: No, score=-17.426 tagged_above=-999 required=5 tests=[AWL=0.172, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I9jrK8LjLvTr for <oauth@ietfa.amsl.com>; Wed, 13 Jun 2012 08:07:42 -0700 (PDT)
Received: from nm6-vm2.bullet.mail.ne1.yahoo.com (nm6-vm2.bullet.mail.ne1.yahoo.com [98.138.90.154]) by ietfa.amsl.com (Postfix) with SMTP id 9816521F84EC for <oauth@ietf.org>; Wed, 13 Jun 2012 08:07:41 -0700 (PDT)
Received: from [98.138.90.48] by nm6.bullet.mail.ne1.yahoo.com with NNFMP; 13 Jun 2012 15:07:37 -0000
Received: from [98.138.89.193] by tm1.bullet.mail.ne1.yahoo.com with NNFMP; 13 Jun 2012 15:07:37 -0000
Received: from [127.0.0.1] by omp1051.mail.ne1.yahoo.com with NNFMP; 13 Jun 2012 15:07:37 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 434226.46594.bm@omp1051.mail.ne1.yahoo.com
Received: (qmail 94033 invoked by uid 60001); 13 Jun 2012 15:07:36 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1339600056; bh=DzKcAFzrcRST2Rp2O8pQfh6RUEbH8CKY6sdfwiaiObY=; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=qjr3WTMStsOnAFUwJsSaxu/ucMTBoGDIISF+ybU7OUTYMln3snf8GEQEJVjTRbQJ4hnboDGx82Dgzv3ZwOBPw0HbWZx0L+XopsKDZdL+Q4y79MZkm9iNg/ne0AG8jsCovKNZnVNMQ3owG1AMrrhuE4SJL44MrmPXvz+FhN7KxXM=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=X-YMail-OSG:Received:X-RocketYMMF:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:Cc:In-Reply-To:MIME-Version:Content-Type; b=KCA1o0gI7rnrDvnDcEBkzmj3rX57S0EcQ6BemDVlB9jyF9BarmnHkS3dadOsYZajBjgGFUMwyBcL2aumTXQ0vEadUhCzN0LFyXtlaLW2utl3Zyu9egzzoPbhOX9u+1VVWxs1UhJYdhAYvV2qAK56lXPpsiZ8NF/MFgC6UdlZtEA=;
X-YMail-OSG: L.If7yQVM1kF9zwYyMLWdqMJxiEhahk8xMkRitlWpJ4ObSx OCheHF1X48RlvpDpxg0l1QoDwoXa4VZDX_.f1iwXaqdJo5zmZFZXw2EtUkDf .z0WwxLbp7fXELdpZMwugpVWHZrALrsM8dbeHb8.8jzmHZBHG_WWx2wn6hS3 zqHxNU.HULZAHc7BMT3R6MECZvqeF9jl_mKctnLBPyvm9ec5UQ6HpEkiw5Oe UeRHjSAYVHIT_5PSyZDRG2XpI4pZ4X3DuRTsKMjTX1nSwZ8jwr0FfJl4Q319 xd4T6Lm61AYghLXrBtCsGMJ0OdknBf90c7NBmbRoFBbaq_FLEDKoifVOJmrt kWtLMzmiSvj.3Ap3qL..rA.4z8NEC3QOcIKraaXGuHV.CrvK61SBACtOUcoN nieUvf.BCadAcXQSPhYkIx9e__dwbFrSy2vC4vBWQ_sVmYvz4jBgJhq.4v3P hJOsqEq7cungsnRfaDXoyt7HUnsn.6JcMQ56b17wC5MbPNmINKNZMins8XQW Ab1KZHOPgMNdqneR8g87cZj8jyWuaK5xQ2THGlQNfuO1.f7W5BAAS27KAc23 ylq7mIt1Pi2VrsrLqAybGeYew8SPVcXHCd43VvGUPYU8j33Iwp._j
Received: from [209.131.62.115] by web31810.mail.mud.yahoo.com via HTTP; Wed, 13 Jun 2012 08:07:36 PDT
X-RocketYMMF: william_john_mills
X-Mailer: YahooMailWebService/0.8.120.356233
References: <c6742600-c95a-46ae-b96c-2230a575f20c@email.android.com> <47d860c2-976a-48f0-90df-feee360d355a@email.android.com> <89A82128-52B0-4EB4-B16F-69ED51262DB2@ve7jtb.com>
Message-ID: <1339600056.32647.YahooMailNeo@web31810.mail.mud.yahoo.com>
Date: Wed, 13 Jun 2012 08:07:36 -0700
From: William Mills <wmills@yahoo-inc.com>
To: John Bradley <ve7jtb@ve7jtb.com>, Torsten Lodderstedt <torsten@lodderstedt.net>
In-Reply-To: <89A82128-52B0-4EB4-B16F-69ED51262DB2@ve7jtb.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="1935884094-945985727-1339600056=:32647"
Cc: Julian Reschke <julian.reschke@gmx.de>, Richard Mortier <richard.mortier@nottingham.ac.uk>, "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Dynamic clients, URI, and stuff Re: Discussion needed on username and password ABNF definitions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: William Mills <wmills@yahoo-inc.com>
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Jun 2012 15:07:44 -0000

OK cool, a use case.  Does the language I suggested in another thread generally work for you then, is something liek that needed?




>________________________________
> From: John Bradley <ve7jtb@ve7jtb.com>
>To: Torsten Lodderstedt <torsten@lodderstedt.net> 
>Cc: Julian Reschke <julian.reschke@gmx.de>; Richard Mortier <richard.mortier@nottingham.ac.uk>; "oauth@ietf.org" <oauth@ietf.org> 
>Sent: Wednesday, June 13, 2012 3:56 AM
>Subject: Re: [OAUTH-WG] Dynamic clients, URI, and stuff Re: Discussion needed on username and password ABNF definitions
> 
>
>I think that the issues are getting confused.
>
>
>There is a use case where the Authorization server may be a embedded app, at least in one openID case.    As it won't have a separate registration or token endpoint,  the client needs to make its own clientID for the request.   A reasonable thing to use is the redirect URI to create a unique value that the user could use for revocation at a later point.
>
>
>Currently with the no : restriction we would use the host and path to crate the clientid.
>There are some scenarios where having the scheme as part of that would be helpful.
>
>
>This has nothing to do with discovery or the dynamic client registration proposal as far as I know.
>
>
>A URL as a client_id comes from prototype work for a personal provider that we are doing as part of openID Connect.
>
>
>John B.
>
>On 2012-06-13, at 7:50 AM, Torsten Lodderstedt wrote:
>
>Hi all,
>>
>>can anyone please explain the relation between dynamic client registration and URIs as client ids? None of the current drafts (uma or connect) seem to require URIs.
>>
>>regards,
>>Torsten.
>>
>>
>>
>>
>>Jianhua Shao <psxjs4@nottingham.ac.uk> schrieb:
>>Hello,
>>>
>>>
>>>Dynamic client registration is very useful if client or resource or authorisation server is not permanently available. 
>>>A typical case is that is the resource or authorisation server is in mobile platform, the connection is not always available. 
>>>Another typical case is that authorisation server do not necessary to have client pre-registered on itself. At moment, industry like facebook would like developer to register a app on its app centre first, and then ask user auth to use the app. 
>>>
>>>
>>>We are researchers from Digital Economy Research Institute. We have this problem When we developing Dataware that could manage the control of access to personal data. We play around our solution base on Oauth2: https://github.com/jianhuashao/dataware.catalog/wiki
>>>
>>>
>>>We are in the list to receive your mail list,
but currently need moderate to post any message. cc my colleague, Richard Mortier
>>>Best
>>>Jian
>>>
>>>
>>>
>>>On 12 Jun 2012, at 21:08, Eran Hammer wrote:
>>>
>>>The only distinction I would make is between removing flexibiliy to proactively enabling future extensibility. I would stop short of perscribing encoding in order to fit uri into the Basic auth fields. But if there is a way to allow this to be less restrictive without clean interop issues, that would be nice.
>>>> 
>>>>I do agree we need some actual use cases before we spend much more time on this.
>>>> 
>>>>EH
>>>> 
>>>>From: William Mills [mailto:wmills@yahoo-inc.com] 
>>>>Sent: Tuesday, June 12, 2012 1:04 PM
>>>>To: Eran Hammer; Mike Jones; Hannes Tschofenig; Julian Reschke
>>>>Cc: oauth@ietf.org
>>>>Subject: Dynamic clients, URI, and stuff Re: [OAUTH-WG] Discussion needed on username and password ABNF definitions
>>>> 
>>>>I think dynamic client registration is something we have not talked out enough yet.  There's a pretty clear use case for dynamic registration.  
>>>> 
>>>>Does identifying the client with a URI allow some form of OpenID-ish flow for this? 
>>>>Is the client ID as a URI a way to  allow a
trusted site to provide metadata about the client?
>>>>Is that URI a way to hit an IDP we trust to validate the client in some way with the provided secret?
>>>> 
>>>>I guess what I'm looking for here is a concrete use case/problem to solve, rather then leaving a hook we think is the right thing.
>>>> 
>>>>-bill
>>>> 
>>>> 
>>>>>
>>>>>________________________________
>>>>>
>>>>>From: Eran Hammer <eran@hueniverse.com>
>>>>>To: Mike Jones <Michael.Jones@microsoft.com>; William Mills <wmills@yahoo-inc.com>; Hannes Tschofenig <hannes.tschofenig@gmx.net>; Julian Reschke <julian.reschke@gmx.de> 
>>>>>Cc: "oauth@ietf.org" <oauth@ietf.org> 
>>>>>Sent: Tuesday, June 12, 2012 11:39 AM
>>>>>Subject: RE: [OAUTH-WG] Discussion needed on username and password ABNF definitions
>>>>> 
>>>>>Is the use case of using URI as client ids important? It seems like something that might become useful in the future where clients can use their verifiable servers to bypass client registration and simly use a URI
the server can validate via some other means.
>>>>> 
>>>>>I just want to make sure those thinking about more complex use cases involving dynamic registration or distri buted
client manamgenet are aware of this potential restriction.
>>>>> 
>>>>>I'm fine either way.
>>>>> 
>>>>>EH
>>>>> 
>>>>>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of Mike Jones
>>>>>Sent: Tuesday, June 12, 2012 11:27 AM
>>>>>To: William Mills; Hannes Tschofenig; Julian Reschke
>>>>>Cc: oauth@ietf.org
>>>>>Subject: Re: [OAUTH-WG] Discussion needed on username and password ABNF definitions
>>>>> 
>>>>>Not internationalizing fields intended for machine consumption only is already a precedent set and agreed to by the working group, so let me second Bill’s point in that regard.  For instance, neither “scope” nor “error” allow non-ASCII characters.
>>>>> 
>>>>>Julian, if you want different ABNF text than the text I wrote below, I believe it would be most useful if you would provide the exact replace wording that you’d like to see instead of it.  Then there’s no possibility of misunderstanding the intent of suggested changes.
>>>>> 
>>>>>                                                            Thanks all,
>>>>>                                                            -- Mike
>>>>> 
>>>>>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of William Mills
>>>>>Sent: Tuesday, June 12, 2012 11:18 AM
>>>>>To: Hannes Tschofenig; Julian Reschke
>>>>>Cc: oauth@ietf.org
>>>>>Subject: Re: [OAUTH-WG] Discussion needed on username and password ABNF definitions
>>>>> 
>>>>>I agree generally with your assumption about clients, but rather than saying "clients are devices" I think it makes much more sense to say "clients are NOT users, so client_id need not be internationalized".  In practical terms there is very little to argue for anythign beyond ASCII in a client_secret, base64 encoding or the equivalent being a fine way to transport arbitrary bits in a portable/reasonable way.
>>>>> 
>>>>>I argue that client_id need not be internationalized because I assume that any really internationalized application will have an internationalized presentation layer that's presenting a pretty name for the client_id.
>>>>> 
>>>>>-bill
>>>>> 
>>>>>
>>>>>________________________________
>>>>>
>>>>>From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
>>>>>To: Julian Reschke <julian.reschke@gmx.de> 
>>>>>Cc: "oauth@ietf.org" <oauth@ietf.org> 
>>>>>Sent: Tuesday, June 12, 2012 11:01 AM
>>>>>Subject: Re: [OAUTH-WG] Discussion needed on username and password ABNF definitions
>>>>>
>>>>>I had a chat with Julian yesterday and here is my short summary. 
>>>>>
>>>>>Section 2.3 of the core draft defines client authentication based on two mechanisms
  (and
provides room for extensions):http://tools.ietf.org/html/draft-ietf-oauth-v2-27#section-2.3
>>>>>
>>>>>1) HTTP Basic Authentication
>>>>>
>>>>>2) A custom OAuth authentication mechanism (which uses client_id and client_secret)
>>>>>
>>>>>With HTTP Basic authentication the problem is that this is a legacy technology and there is no internationalization support. 
>>>>>
>>>>>With our brand new custom OAuth authentication mechanism we have more options. 
>>>>>
>>>>>One possible approach is to say that the clients are devices (and not end users) and therefore internationalization does not matter. 
>>>>>
>>>>>Is it, however, really true that only US-ASCII characters will appear in the client_id and also in the client_secret? 
>>>>>
>>>>>Here we have the possibility to define something better. 
>>>>>
>>>>>In any case we have to restrict the characters that are used in these two authentication mechanisms since they could conflict with the way how we transport the data over the underlying protocol. Julian mentioned this in his previous mails. 
>>>>>
>>>>>Julian, maybe you can provide a detailed text proposal for how to address your comment in case we go for UTF8 (with % encoding) for the custom OAuth client authentication mechanism? 
>>>>>
>>>>>Ciao
>>>>>Hannes
>>>>>
>>>>>On Jun 12, 2012, at 11:54 AM, Julian Reschke wrote:
>>>>>
>>>>>> On 2012-06-12 00:16, Mike Jones wrote:
>>>>>>> Reviewing the feedback from Julian, John, and James, I'm coming to the conclusion that client_id and client_secret, being for machines and not humans, shou
 ld be
ASCII, whereas username and password should be Unicode, since they are for humans.  Per John's feedback, client_id can not contain a colon and be compatible with HTTP Basic.
>>>>>> 
>>>>>> I'm not sure that restricting the character repertoire just because one way to send requires this is the right approach. My preference would be not to put this into the ABNF, and just to point out that certain characters will not work over certain transports, and to just advise to avoid them.
>>>>>> 
>>>>>>> Therefore, I'd like to propose these updated ABNF definitions:
>>>>>>> 
>>>>>>>    VSCHAR = %20-7E
>>>>>>>    NOCOLONVSCHAR = %x20-39 / %x3B-7E
>>>>>>>    UNICODENOCTRLCHAR = <Any Unicode character other than ( %x0-1F / %x7F )>
>>>>>>> 
>>>>>>>    client-id = *NOCOLONVSCHAR
>>>>>>>    client_secret = *VSCHAR
>>>>>>> 
>>>>>>>    username = *UNICODENOCTRLCHAR
>>>>>>>    password = *UNICODENOCTRLCHAR
>>>>>> 
>>>>>> In this case you should add an introductory statement pointing out that the ABNF defines the grammar in terms of Unicode code points, not octets (as it is the case most of the time).
>>>>>> 
>>>>>>> It turns out that non-ASCII characters are OK for username and password because the Core spec only passes them in the form body - not using HTTP Basic - and UTF-8 encoding is specified.
>>>>>> 
>>>>>> I'll send a separate mail about that, the current text in the spec is way too unspecific.
>>>>>> 
>>>>>>>                 -- Mike
>>>>>>> 
>>>>>>> P.S.  If anyone has a better ABNF for UNICODENOCTRLCHAR than "<Any Unicode character other than ( %x0-1F / %x7F )>", please send it to me!
>>>>>> 
>>>>>> As noted before, here's an example: <http://greenbytes.de/tech/webdav/rfc5323.html#rfc.section.5.15.1>
>>>>>> 
>>>>>> Best regards, Julian
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>>
>>>>>_______________________________________________
>>>>>OAuth mailing list
>>>>>OAuth@ietf.org
>>>>>https://www.ietf.org/mailman/listinfo/oauth
>>>>> 
_______________________________________________
>>OAuth mailing list
>>OAuth@ietf.org
>>https://www.ietf.org/mailman/listinfo/oauth
>>
>>
>>This message and any attachment are intended solely for the addressee and may 
contain confidential information. If you have received this message in error, 
please send it back to me, and immediately delete it.   Please do not use, 
copy or disclose the information contained in this message or in any attachment.  
Any views or opinions expressed by the author of this email do not necessarily 
reflect the views of the University of Nottingham. 
>>This message has been checked for viruses but the contents of an attachment
may still contain software viruses which could damage your computer system:
you are advised to perform your own checks. Email communications with the
University of Nottingham may be monitored as permitted by UK legislation. _______________________________________________
>>OAuth mailing list
>>OAuth@ietf.org
>>https://www.ietf.org/mailman/listinfo/oauth
>>
>
>_______________________________________________
>OAuth mailing list
>OAuth@ietf.org
>https://www.ietf.org/mailman/listinfo/oauth
>
>
>