Re: [OAUTH-WG] Mandatory-to-implement token type

Stephen Farrell <stephen.farrell@cs.tcd.ie> Fri, 02 December 2011 01:53 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF40D1F0C5F for <oauth@ietfa.amsl.com>; Thu, 1 Dec 2011 17:53:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.589
X-Spam-Level:
X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 84fHvY1WVv8X for <oauth@ietfa.amsl.com>; Thu, 1 Dec 2011 17:53:33 -0800 (PST)
Received: from scss.tcd.ie (hermes.cs.tcd.ie [IPv6:2001:770:10:200:889f:cdff:fe8d:ccd2]) by ietfa.amsl.com (Postfix) with ESMTP id 6D0D31F0C5E for <oauth@ietf.org>; Thu, 1 Dec 2011 17:53:33 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by hermes.scss.tcd.ie (Postfix) with ESMTP id C64A51541AF; Fri, 2 Dec 2011 01:53:32 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; h= content-transfer-encoding:content-type:in-reply-to:references :subject:mime-version:user-agent:from:date:message-id:received :received:x-virus-scanned; s=cs; t=1322790811; bh=engEdd/+aIQDg0 6dRamOJihVPX8cKhO8wLrJlgkBsRc=; b=vjrVJKQdu9iu3QisTRtBecbbpObKqr GLBYMqG7xtQ9J61nH/EQsRukwxCEqwb6RLRyEY/YSQus5sdzGwNsvdVLWdswBUNe 4TzxdbXaNt9Rsu/qvCZbBPMaOvVY14W6sk9us858kPqukb7PawnCsBlfqK8l6PcB p8I5ZplCHNerPR2luVkNsih6g3QXFhxXjZLjEupqFF3YZ5Xwq/6r75+voGZXmr9J XCxTALyIiv1kQG+8ZUHEF8YSmGcHwC3Yw1io1TO2E9g/LogAsomYjrry5nDS4pTR 1Ku1U3BcBzzho2nOEuT550D/6Dyolxga423N1A/DwFswK0X4GfsaPGqA==
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from scss.tcd.ie ([127.0.0.1]) by localhost (scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10027) with ESMTP id TL8l5LYsQlvY; Fri, 2 Dec 2011 01:53:31 +0000 (GMT)
Received: from [10.87.48.9] (unknown [86.41.14.223]) by smtp.scss.tcd.ie (Postfix) with ESMTPSA id 46B6E153C7E; Fri, 2 Dec 2011 01:53:30 +0000 (GMT)
Message-ID: <4ED82F99.9030400@cs.tcd.ie>
Date: Fri, 02 Dec 2011 01:53:29 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:8.0) Gecko/20111105 Thunderbird/8.0
MIME-Version: 1.0
To: William Mills <wmills@yahoo-inc.com>
References: <CALaySJJ+2au5rxEQmSSpXO42KmgCu=NhiLPBCx-3AH0hud=5CQ@mail.gmail.com> <4ED7F0D8.6010703@cs.tcd.ie> <17870960-E739-40BC-B2C1-EB93507F34EA@oracle.com> <4ED8288E.90101@cs.tcd.ie> <1322790633.20785.YahooMailNeo@web31816.mail.mud.yahoo.com>
In-Reply-To: <1322790633.20785.YahooMailNeo@web31816.mail.mud.yahoo.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Barry Leiba <barryleiba@computer.org>, oauth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Dec 2011 01:53:34 -0000

On 12/02/2011 01:50 AM, William Mills wrote:
> If we MTI a "weaker" token type (arguably Bearer falls here) that means
> the spec will be inappropriate in higher security requirement situations, those folks walk away.

Disagree. People who need more can specify more.

The base spec not having an MTI doesn't help them at all since
absent any MTI it'd clearly not be appropriate for higher
security environments to use your term.

> If we MTI something like SAML it makes the folks that want a light weight Bearer token solution walk away.

I would agree that SAML might be too heavy. If the WG do
pick an MTI then it does need to be relatively simple.

S.

>
>
> ________________________________
>   From: Stephen Farrell<stephen.farrell@cs.tcd.ie>
> To: Phil Hunt<phil.hunt@oracle.com>
> Cc: Barry Leiba<barryleiba@computer.org>; oauth WG<oauth@ietf.org>
> Sent: Thursday, December 1, 2011 5:23 PM
> Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
>
>
> On 12/02/2011 12:23 AM, Phil Hunt wrote:
>> Because different token types have distinct advantages in different scenarios, choosing a single MTI would be difficult.
>
> I just don't get that. Why is it somehow difficult to pick one
> but at the same time easy to implement any?
>
> <snip /
>
>
> ________________________________
>   From: Stephen Farrell<stephen.farrell@cs.tcd.ie>
> To: Phil Hunt<phil.hunt@oracle.com>
> Cc: Barry Leiba<barryleiba@computer.org>; oauth WG<oauth@ietf.org>
> Sent: Thursday, December 1, 2011 5:23 PM
> Subject: Re: [OAUTH-WG] Mandatory-to-implement token type
>
>
>
> On 12/02/2011 12:23 AM, Phil Hunt wrote:
>> Because different token types have distinct advantages in different scenarios, choosing a single MTI would be difficult.
>
> I just don't get that. Why is it somehow difficult to pick one
> but at the same time easy to implement any?
>
>> E.g. MAC tokens work well for non-TLS protected resources.  Bearer tokens in contrast are easier to use, but require TLS protected service to avoid theft-of-credential.
>
> So picking is a nuisance sure. But it helps interop.
>
>> Even at this level, site security policies will simply override
> whatever is stated in the specification and choose one type only.
>
> Yes, but those policies will be affected by what's available in
> the running code. I'd like if what's available was known when
> the coder says "we implement RFC<foo>"
>
>> Having multiple MTIs, suggests choice and that causes other problems. What happens when a client wants to use a bearer token over an unprotected connection? How does the client discover what can be used and when?
>
> Having no MTI causes identical problems.
>
>> The approach we have now where the Token specification defines interop requirements and a profile for use with OAuth2 seems to be a good way to go.
>
> We disagree about that I guess. To me it seems a peculiar way to go
> unless one assumes that coders write code that's specific to a specific
> service provider.
>
> S.
>
>> Phil
>>
>> @independentid
>> www.independentid.com
>> phil.hunt@oracle.com
>>
>>
>>
>>
>>
>> On 2011-12-01, at 1:25 PM, Stephen Farrell wrote:
>>
>>>
>>> Barry, all,
>>>
>>> First, apologies for being so slow responding, various
>>> travels got in the way. I hope we can quickly resolve this now.
>>>
>>> Bit of process first: at the meeting we discussed this and at the
>>> end of that discussion, there were quite a few more folks for the
>>> "pick one" position. People who favour that outcome and really
>>> care about that need to speak up on the list, since the list
>>> consensus trumps the sense of the room in the chairs' evaluation
>>> of the WG consensus.
>>>
>>> Second, at the meeting I said that I'd like to see either MAC or
>>> bearer picked as MTI, and if not, that I want the draft to say
>>> why its ok to have no MTI token type. So the WG either need to
>>> pick one, or else explicitly and convincingly justify not
>>> picking one. That's the "firm" AD position to which Barry
>>> referred. (I didn't properly call out the "if not" part of
>>> that in my AD review, sorry.)
>>>
>>> My own argument for picking one is simple: if every relevant
>>> piece of code has to know how to handle one then it becomes
>>> easier to get interop. If everyone decides for themselves
>>> then interop is less likely since there are currently two
>>> choices and may be more in future.
>>>
>>> I do realise that the background here and current practice
>>> is that code tends to be written that is specific to a
>>> resource server (or however that's best phrased) but that's
>>> maybe where the IETF differs from the community that produced
>>> OAuth - here we want two independent implementers who've
>>> never talked to produce code that interops even so.
>>>
>>> I also realise that that's not the full story for getting
>>> interop with OAuth and that more is needed. However, this
>>> aspect is otherwise fully specified and so I don't buy the
>>> argument that this isn't worth doing just because we don't
>>> have the full registration story etc. figured out. If we don't
>>> sort this out now, then later specs will have to update
>>> this one in this respect. possibly making existing code
>>> "non-compliant" in some sense, so just going ahead and doing
>>> it right now is better.
>>>
>>> So, pick one (my strong personal preference) or establish and
>>> document why you're not picking one seem to me to be the choices
>>> available.
>>>
>>> Regards,
>>> Stephen.
>>>
>>>
>>> On 11/17/2011 08:28 AM, Barry Leiba wrote:
>>>> Stephen, as AD, brought up the question of mandatory-to-implement
>>>> token types, in the IETF 82 meeting.  There was some extended
>>>> discussion on the point:
>>>>
>>>> - Stephen is firm in his belief that it's necessary for
>>>> interoperability.  He notes that mandatory to *implement* is not the
>>>> same as mandatory to *use*.
>>>> - Several participants believe that without a mechanism for requesting
>>>> or negotiating a token type, there is no value in having any type be
>>>> mandatory to implement.
>>>>
>>>> Stephen is happy to continue the discussion on the list, and make his
>>>> point clear.  In any case, there was clear consensus in the room that
>>>> we *should* specify a mandatory-to-implement type, and that that type
>>>> be bearer tokens.  This would be specified in the base document, and
>>>> would make a normative reference from the base doc to the bearer token
>>>> doc.
>>>>
>>>> We need to confirm that consensus on the mailing list, so this starts
>>>> the discussion.  Let's work on resolving this over the next week or
>>>> so, and moving forward:
>>>>
>>>> 1. Should we specify some token type as mandatory to implement?  Why
>>>> or why not (*briefly*)?
>>>>
>>>> 2. If we do specify one, which token type should it be?
>>>>
>>>> Barry, as chair
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth