[OAUTH-WG] draft minutes of OAuth WG interim meeting, 2010-01-21

Peter Saint-Andre <stpeter@stpeter.im> Thu, 28 January 2010 03:36 UTC

Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 66BF23A690A; Wed, 27 Jan 2010 19:36:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L-hajA+TDXrE; Wed, 27 Jan 2010 19:36:09 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 74D9A3A677C; Wed, 27 Jan 2010 19:36:09 -0800 (PST)
Received: from squire.local (dsl-205-60.dynamic-dsl.frii.net [216.17.205.60]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id A096140126; Wed, 27 Jan 2010 20:36:24 -0700 (MST)
Message-ID: <4B610627.9080609@stpeter.im>
Date: Wed, 27 Jan 2010 20:36:07 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: "proceedings@ietf.org" <proceedings@ietf.org>, OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha1"; boundary="------------ms080606020709060700080209"
Subject: [OAUTH-WG] draft minutes of OAuth WG interim meeting, 2010-01-21
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 03:36:11 -0000

These are draft minutes of the OAuth WG's interim meeting held via WebEx
on 2010-01-21. Please send corrections to the chairs, Blaine Cook and
Peter Saint-Andre. Many thanks to Eve Maler for scribing.

========================================================================

OAuth WG
Minutes of Interim Meeting, 2010-01-21

Chairs: Blaine Cook and Peter Saint-Andre

Scribe: Eve Maler

Minutes Editor: Peter Saint-Andre

Agenda:

http://www.ietf.org/mail-archive/web/oauth/current/msg01013.html

Audio:

https://workgreen.webex.com/workgreen/lsr.php?AT=pb&SP=MC&rID=3662907&rKey=39ebc5009f8c0b12

Dramatis Personae (people who spoke during the meeting):

Richard Barnes
Blaine Cook
Lisa Dusseault
Dick Hardt
Eve Maler
Peter Saint-Andre
Hannes Tschofenig

Many other attendees, but no "blue sheets" to provide a record.

========================================================================

AGENDA

1. Introduction (5 minutes)

   a. NOTE WELL applies to interim meetings!

      http://www.ietf.org/about/note-well.html

   b. Welcome from the chairs

   c. Volunteer to scribe

      Eve Maler volunteered, many thanks!

   b. Agenda bashing

Dick: Get clarity around authentication, authorization, web delegation
concepts, and why specs are broken out the way they are.

Blaine: Much debate in the past.  Authentication is sending request with
authn information saying "This is a request that is being made by token
x."  Authorization is the issuance of that token, and a successful
request using that token once you have it.

Dick: This is confusing.  There's authn, and then there's "authentic
authorization".  The token is used to make an authorizing decision.

Blaine: Just reporting OAuth community usage.

Richard: (missed)

Hannes: Ideal to reuse terms from other communities.  E.g., see Handbook
of Applied Cryptography.

Blaine: Given the confusion around, let's clarify in the draft.

Peter: Let's give Eran an action item to do this! :-)

2. Goals of the Interim Meetings (5 minutes)

   a. Accurately describe the problem space
   b. Gather scenarios / use cases / profiles
   c. For authentication, reach *rough* consensus
   d. For authorization and delegation, determine roughly which aspects
      are "core" and which are "extensions"
   e. Make significant progress before IETF 77 in Anaheim
   f. Any others?

Peter: Blaine, Eran, I and others have talked about what to accomplish
before Anaheim.  WRAP, UMA efforts provide new input to "OAuth V2.0"
effort.  OAuth V1.0 problems have been identified.  Problem space has
shifted and expanded.  Things like splitting out authorization servers
have come to the fore.  Clarifying architectural pieces, entities, and
terminology would be good.

Hannes: Originally wanted to quickly go through some open issues and be
done with it, but then learned about WRAP and UMA.  We have a thicket of
use cases, some contradicting.  E.g., simple extensions taken as a whole
make things complicated.  Liberty Alliance didn't stay focused enough
and produced something complex.  WRAP spec is easy to understand and is
a little bit like Kerberos.

Peter: Once a new tool is available, people start using it for more
things.  Can we factor out the common features of all those ideas?

Hannes: Scenarios don't need to be a published RFC -- takes too long --
but it makes sense to do this factoring.

Peter: Many people thought OAuth V1.1 would be easy and quick.  So the
idea is to deliberately do use case work to guide the scope expansion.

Eve: UMA will submit use cases to this community shortly.

Peter: The WRAP work that people like Dick, David, Allen, and Brian have
done could be seen from one angle -- the profile work -- as use cases.

Dick: WRAP motivations were looking at OAuth and giving it slightly
different architectural parameters in solving similar design patterns.
E.g., at scale, it helps to let the protected resource work with an
authorization server.  And using TLS as an alternative.  Agrees with the
idea of using a process to collect use cases.  Taking into account
implementation and deployment effort is good.  WRAP can work well for
people who have SSL, and original OAuth can work well when SSL isn't
available.  Existing libraries for OAuth are still there.
Architecturally, OAuth and WRAP are quite different.  In WRAP, the
client gets a token directly from the authorizing server.

Eve: Useful to see the use cases for each difference, to understand the
benefit of each.  E.g., SSL provides channel security but not data
origin authentication.

Peter: Using the photo site/photo printing example, there are only
simple access choices.  But if the protected resource (WRAP term) has a
number of possible actions on it, the scope of authorization may need to
be more sophisticated.  Maybe those solutions need to be extensions on
top -- or not.

Blaine: Maybe do a feature matrix of what each of us thinks our protocol
supports, then as a community build a common understanding.

Eve: FWIW, here is the UMA technology comparison matrix:

http://kantarainitiative.org/confluence/display/uma/Technology+Matrix

No WRAP column yet.  Note that UMA layers on top of three OAuth
instances, "using" OAuth rather than being an alternative.  If more
functionality sediments down, that's great.

?: Security features are hard to argue about, because it depends so
heavily on deployment details.  Channel security can be there at a lower
layer, but data origin authentication happens at a higher layer.

Peter: Use cases are therefore critical.

Eve: Yes, use "agile specification" to ensure each feature can be traced
back to solving a use case.

?: At what level to specify use cases?  The photo example is so broad it
can accommodate lots of solutions.

Peter: SSL isn't a use case. :-)

Hannes: Assumptions such as having certificates available can be baked
into use case alternatives.  E.g., if you have an iPhone app with
certain constraints, that motivates the use case sufficiently.

[following agenda items covered above or delayed until next meeting]

3. Problem Space (10 minutes)

   a. Need a clearer definition of what we're trying to solve
   b. Has the problem shifted since OAuth 1.0?
   c. What problem are we solving now?
   d. Can we settle on consistent terminology, please? :)
   e. Architecture matters

3. Scenarios (15 minutes)

   a. Core scenarios, see draft-ietf-oauth-web-delegation-01
   b. Scenarios from WRAP, see draft-hardt-oauth-01
   c. Scenarios from User Managed Access (UMA), I-D on the way?
   d. How can we gather other scenarios?

6. Authentication (10 minutes)

   a. draft-ietf-oauth-authentication
   b. Open issues

7. Authorization and Delegation (10 minutes)

   a. What is core?
   b. What can we define as extensions?

8. Action Items (5 minutes)

   a. Gather more scenarios
   b. Review draft-ietf-oauth-authentication and work through
      remaining issues
   c. Input on authorization and delegation
   d. Time of next interim meeting

Peter: What are next steps and action items?  Rough consensus: Get
more scenarios, use cases, and profiles on the table, and discuss
further what level they should be at.  Also, let's put together a
matrix.

Dick: Let's also get agreement on terms, so we can avoid confusion in
the matrix.

All: Agree!

Richard: Is the goal to allow a user to delegate access to a
resource?  Is this the common thread?

Dick: No, it's not.

Peter: Why not?

Dick: The first two WRAP profiles, where the client is acting
autonomously, don't match that description.

Eve: And the classic two-legged flow also differs.  Is that on the
table for OAuth V2.0?

Paul: The "two-legged" flow is still to get an access token
provisioned, so it might utilize the whole delegation flow but
apply to an autonomous client.

JeffH: Don't use "legs"; those refer to a flow diagram.

Blaine: And depending on the "legs", you could have flows with a
consumer token and no user token, and vice versa.  So those are
two separate use cases to consider.

Dick: This is all why we see the use cases as broader than "user
delegation".  And BTW, we need clarity on token terminology!

Peter: There's a plethora of authentication technologies, so I'm
leery of offering OAuth as YAAT.  If HTTP needs some better
options, this seems to be where Eran was going with his authn
draft.  That's all okay, but let's be clear if we're doing that.
The registration aspect is also interesting; IETF hasn't developed
anything like this.  In addition to the traditional delegation flows,
let's figure out the true value of the underlying functions that are
part of OAuth.

Lisa: The OAuth BOF seemed to show that the HTTP group has a pent-up
desire for better authentication options, and this would be valuable to
do.  Patching SASL onto HTTP has seen enormous work, but has failed.
A limited-scope task of binding a well-known authentication mechanism to
HTTP, improving on Basic and Digest, would be welcomed.

Peter: Agreed.  At this point, chairs will drill down on action items
for terminology, matrix, etc.  The group can use the wiki for some of
this work.  Meetings need two-week notice, so we'll meet again in two
weeks.  The current plan is to hold the next meeting on February 4.

http://trac.tools.ietf.org/wg/oauth/trac/wiki

Blaine: There are people not on today's call who would be good to have
on future calls.  Maybe we can do a Doodle poll to pick a better time.

Peter: Spoke to a number of folks who simply couldn't make it this time,
including Eran.  Thanks to those who have contributed to date!

All: Meeting was helpful and productive.  Thanks!

========================================================================