Re: [OAUTH-WG] Clarifying the scope of the OAuth 2.1 spec

Mike Jones <Michael.Jones@microsoft.com> Mon, 16 March 2020 18:35 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DD663A0EF0 for <oauth@ietfa.amsl.com>; Mon, 16 Mar 2020 11:35:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QGRsM3F5ssVR for <oauth@ietfa.amsl.com>; Mon, 16 Mar 2020 11:35:16 -0700 (PDT)
Received: from NAM06-BL2-obe.outbound.protection.outlook.com (mail-eopbgr650126.outbound.protection.outlook.com [40.107.65.126]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9437C3A0EEB for <oauth@ietf.org>; Mon, 16 Mar 2020 11:35:16 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; =?utf-8?q?b=3DCGO4YM77dl0aJlMExdUGTmU6c3F7CQxDUwnSoCQwvIdNoNxACxg6vwWYzLcfG?= =?utf-8?q?IC/dnSq/9fseEgKndTaXsPYxPsNAR36GAIhgPdDsoIAnPGDi+dHlPmSApc5BEabDl?= =?utf-8?q?ugGqTPqckpm4gil/xiARiD/gfvunBMocS+VbfMKI16nXeXSQTGKUYAeHias1xAhl2?= =?utf-8?q?CB26b/UaIv6U5EpsxuHVzqICHxG1/iYcjhWWREZAgueAhyxGpred2zn821d1KWLoj?= =?utf-8?q?sC/Qg7lo1TEG5aQTpTNoHAOSf7Y50o3bHt4wV4Q2yH7qgVnEC1gtNEBHfiagMFzSS?= =?utf-8?q?E7Pm5xkCjBJByil7UoERA=3D=3D?=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; =?utf-8?q?h=3DFrom=3ADate=3ASubject=3AMessage-ID=3ACont?= =?utf-8?q?ent-Type=3AMIME-Version=3AX-MS-Exchange-SenderADCheck=3B?= =?utf-8?q?bh=3Ds2dyKkbBvEuycFALaC2KG0Hc+K8BYh2O7AKMcGIr5zo=3D=3B_b=3DcZ8UYY?= =?utf-8?q?Ruo22wv5RT2Xy16MmrQQui/p68l0z+LQKoN5MPHH3FmWpwp6IjwCPoJ2xghQ3kPw4?= =?utf-8?q?uOYha4UhqeDqfTNd6DBd1g0mS3J5GAa+BKNrTkT1s9BNzU17itNE5FH2ODpQ8SDcJ?= =?utf-8?q?onOyftc+xrotwatzBobZupD8Eyy+X8KA9BH1eHSkOTqfXJ2u20OqM8aYeVDuhhZdX?= =?utf-8?q?r7pjTfYm7nB8607K2BKiDfBELS6IbGSLJeMD4JgyecUp0B778nVdsq2Je5SQk42Qt?= =?utf-8?q?kDKR/CbPIgep6kMDNrcsGn51Yez7X90fXi+n9EVWdE2g7QjQTa7RDTp3P6Sj6VJBx?= =?utf-8?q?LavoprLJxnQ=3D=3D?=
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; =?utf-8?q?h=3DFrom=3ADate=3ASubject=3AMessage-ID=3AContent-Typ?= =?utf-8?q?e=3AMIME-Version=3AX-MS-Exchange-SenderADCheck=3B?= =?utf-8?q?bh=3Ds2dyKkbBvEuycFALaC2KG0Hc+K8BYh2O7AKMcGIr5zo=3D=3B_b=3DYnhJGa?= =?utf-8?q?aNmxthYF1NTQRj//38PamBx85+nSDLMB+XhsH2YLN3fbK/gw6WdkT0mEjIw7JRpM9?= =?utf-8?q?B7xXXMmO7LCMoC04KYNX4CYJ/RkflgKRc/2+ALHhLNypfQN2LIlEqwA2WB0N8jmUo?= =?utf-8?q?UaBEl2UffVQXg3GrDgY55vkd6TWZogv/2no=3D?=
Received: from DM6PR00MB0684.namprd00.prod.outlook.com (2603:10b6:5:21c::8) by DM6PR00MB0816.namprd00.prod.outlook.com (2603:10b6:5:208::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2853.0; Mon, 16 Mar 2020 18:35:14 +0000
Received: from DM6PR00MB0684.namprd00.prod.outlook.com ([fe80::6442:6f5e:972:c9f7]) by DM6PR00MB0684.namprd00.prod.outlook.com ([fe80::6442:6f5e:972:c9f7%6]) with mapi id 15.20.2858.000; Mon, 16 Mar 2020 18:35:14 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Dick Hardt <dick.hardt@gmail.com>
CC: "aaron@parecki.com" <aaron@parecki.com>, "torsten@lodderstedt.net" <torsten@lodderstedt.net>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Clarifying the scope of the OAuth 2.1 spec
Thread-Index: AdX7wZ4GR5GC72+bR028wmlhcDNjuQ==
Date: Mon, 16 Mar 2020 18:35:14 +0000
Message-ID: =?utf-8?q?=3CDM6PR00MB06845FEB6201E73E87CA30B9F5F90=40DM6PR00MB0?= =?utf-8?q?684=2Enamprd00=2Eprod=2Eoutlook=2Ecom=3E?=
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: =?utf-8?q?MSIP=5FLabel=5Ff42aa342-8706-4288-bd11-ebb85995028c?= =?utf-8?q?=5FActionId=3D784f947a-5d9c-484a-bbdd-0000b990a3c0=3B?= MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-03-16T18:18:18Z; =?utf-8?q?MSIP=5FLabel=5Ff42aa342-8706-4288-bd11-ebb85995028c=5FSiteId=3D7?= =?utf-8?q?2f988bf-86f1-41af-91ab-2d7cd011db47=3B?=
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com;
x-originating-ip: [50.47.81.134]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 54ef45cf-592f-4282-b3d6-08d7c9d8c47b
x-ms-traffictypediagnostic: DM6PR00MB0816:
x-microsoft-antispam-prvs: =?utf-8?q?=3CDM6PR00MB0816214BAB351F4B12565677F5F?= =?utf-8?q?90=40DM6PR00MB0816=2Enamprd00=2Eprod=2Eoutlook=2Ecom=3E?=
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 03449D5DD1
x-forefront-antispam-report: SFV:NSPM; =?utf-8?q?SFS=3A=2810019020=29=284636?= =?utf-8?b?MDA5KSgzNzYwMDIpKDEzNjAwMykoMzk4NjA0MDAwMDIpKDM0NjAwMikoMzk2?= =?utf-8?b?MDAzKSgzNjYwMDQpKDE5OTAwNCkoNTI1MzYwMTQpKDg2MTAwNikoMjkwNjAwMiko?= =?utf-8?q?966005=29=28316002=29=2871200400001=29=287696005=29=2881156014=29?= =?utf-8?q?=286506007=29=285660300002=29=2853546011=29=28478600001=29=285490?= =?utf-8?b?NjAwMykoODkzNjAwMikoMTAyOTA1MDAwMDMpKDg2NzYwMDIpKDI2MDA1KSg2?= =?utf-8?q?4756008=29=2876236002=29=2866446008=29=288990500004=29=2833656002?= =?utf-8?b?KSg5Njg2MDAzKSg1NTAxNjAwMikoNDMyNjAwOCkoODExNjYwMDYpKDY2NTc0?= =?utf-8?b?MDEyKSg4NjM2MjAwMSkoNjkxNjAwOSkoNzYxMTYwMDYpKDE4NjAwMykoNjY5?= =?utf-8?q?46007=29=2821615005=29=2866476007=29=2866556008=29=2899710200001?= =?utf-8?q?=29=3B?= DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR00MB0816; H:DM6PR00MB0684.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: =?utf-8?q?2EmpAgu2/PGvc+tBDpsKhM0ju+wSc7M?= =?utf-8?q?BsnW9lJILpHkGV4iQJI9bxT9fZhD6ewaREgYHakrVDeRUllkcp3UKQtgXxPHitv+A?= =?utf-8?q?me8yE+WkpD4a1rF7WdCF3FPjXO5JbX7SidisF7p+v7q86XRWFHdOk3Sl45Z8BD5Cp?= =?utf-8?q?KfiLZ+HMXMrQec7AreJ0iEVU3yl/5btxiEtCau/pD3ZS4zfPLplRUjcUXQdnqc/4H?= =?utf-8?q?1LH/kj8YuimUNcJsfd9R9q/zdIRcI/VtIUvcbzkGhn+u9DR2rXyfJKnXtTdcITcdR?= =?utf-8?q?IPTvF+r6H0sllIJslO7PtGRmrsSU+pENbb38Ry3qWzcslsHYaFuXnqJfsP3iJSD9i?= =?utf-8?q?yf2OejMu/z+TuXtVlBH6nPK/4bbjyJ11jIPEnhGKt+bdGJ3BPQ7RWfF5p0srSfUyA?= =?utf-8?q?SpPVOTbKIVkzPnZ0nmpj/KRwDlcuRNexG8zq142HTW2Frz5toWwn0PTMwPTHr68Eh?= =?utf-8?q?rQrww1ZTvPnHzwG12X0sEJy3xvHerXc3P3dq+9q8Q+2PGZf3cxWrxpbMQwRtaevkX?= =?utf-8?q?LweGjMyDWidCy2BBcRgqeBzWh?=
x-ms-exchange-antispam-messagedata: =?utf-8?q?RnLQUPC00vBiJYBVe7ZjhInRqLQs8h?= =?utf-8?q?ucMUgPyh8o2+e5cXWei3hJ4XVgfoJkJ346fLCID+Do8B+39MpU+dL1vjTlEQA+fdW?= =?utf-8?q?hxouSnHloxGVHzUpdYXUUxbRWszSnaOnzxNyHiCSwOtJ3EgjTnyRhmQ=3D=3D?=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM6PR00MB06845FEB6201E73E87CA30B9F5F90DM6PR00MB0684namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 54ef45cf-592f-4282-b3d6-08d7c9d8c47b
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2020 18:35:14.1599 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: =?utf-8?q?9vV8pYBb+WLnSN6rzjzrp?= =?utf-8?q?AEfT2jEUkhiymatsfKawNqoKWuZ26pRA+escOmTKIqNDsAI+k2fyVy9c0EeNHZDOQ?= =?utf-8?q?=3D=3D?=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR00MB0816
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/e-NKaTKhhjcX65oj2wfuqDXs_E0>
Subject: Re: [OAUTH-WG] Clarifying the scope of the OAuth 2.1 spec
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Mar 2020 18:35:19 -0000

Thanks for the clarifications, Dick.  Here’s my resulting proposed changes.  Part of my goal here is for people to understand the goals and non-goals from reading the abstract.

In the Abstract, change:
This specification replaces and obsoletes the OAuth 2.0 Authorization Framework described in RFC 6749<https://tools.ietf.org/html/rfc6749>49>.
to:
This specification replaces and obsoletes these OAuth 2.0 specifications:  RFC 6749 and RFC 8252.  It does so by removing portions of them that are no longer considered best security practices; the portions that remain are compatible with the corresponding portions of the specs being replaced.  By design, it does not introduce any new features to what already exists in the OAuth 2.0 specifications being replaced.

(If you want to list other non-RFCs that you believe that will be obsoleted, you can do that too.)

Add this text to the cited paragraph in Section 2.1:
When this specification does not replace existing specifications produced by the OAuth working group or other non-OAuth-working-group profiles of OAuth that extend OAuth 2.0 via the IANA “OAuth Parameters” registry [IANA.OAuth.Parameters], it is intended that those specifications will continue to be used with OAuth 2.1 in the same manner that they are with the OAuth 2.0 specifications being replaced.

The reference for [IANA.OAuth.Parameters] is https://www.iana.org/assignments/oauth-parameters/.

The last sentence – saying that stuff not explicitly obsoleted isn’t being changed – is critical to reducing the marketplace anxiety that this effort might otherwise create.  Please make it a goal to remove uncertainty and sources of speculation wherever possible.

Thanks again for the useful discussion.

                                                       -- Mike

From: Dick Hardt <dick.hardt@gmail.com>
Sent: Monday, March 16, 2020 8:36 AM
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: aaron@parecki.com; torsten@lodderstedt.net; oauth@ietf.org
Subject: Re: Clarifying the scope of the OAuth 2.1 spec

Hi Mike

I'm aligned on the overall messaging. Sorry I was not clear on my feedback -- it was directed at your suggested text, specifically the terms "OAuth 2.0" and "OAuth 2.0 set of protocols"

FYI: the "new" features, are not new to "OAuth 2.0" per se as they are existing specifications -- my point was that they are not features that are in RFC 6749. OAuth 2.1 is also NOT a superset of all 22 specifications.

This paragraph in the 2.1 doc attempts to describe what OAuth 2.1 is and is not:

Since the publication of the OAuth 2.0 Authorization Framework ([RFC6749<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC6749>]) in October 2012, it has been updated by OAuth 2.0 for Native Apps ([RFC8252<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC8252>])>]), OAuth Security Best Current Practice ([I-D.ietf-oauth-security-topics<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>])>]), and OAuth 2.0 for Browser-Based Apps ([I-D.ietf-oauth-browser-based-apps<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-browser-based-apps>])>]). The OAuth 2.0 Authorization Framework: Bearer Token Usage ([RFC6750<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC6750>]) has also been updated with ([I-D.ietf-oauth-security-topics<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>])>]). This Standards Track specification consolidates the information in all of these documents and removes features that have been found to be insecure in [I-D.ietf-oauth-security-topics<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>]s>].

What changes would you suggest to this?

ᐧ

On Sun, Mar 15, 2020 at 9:01 PM Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> wrote:
I’m glad you like the direction of my comments.  Sometimes saying what you’re *not* doing is as important as saying what you *are* doing, and I think this is such a case.

As an example of why this matters, a developer recently asked me “Would we have to use a different set of endpoints for OAuth 2.1?”  We should clearly scope this work so that the answer is “No, you would use the same endpoints.”

Given that the abstract talks about obsoleting OAuth 2.0, I believe it’s important for the abstract to say what’s being obsoleted, what’s not being obsoleted, and what the relationship of the new spec is to the one(s) it’s obsoleting.  As used in the vernacular by developers, I believe “OAuth 2.0” commonly refers to the set of OAuth 2.0 RFCs approved by this working group, which are the set of (currently 22) RFCs listed at https://datatracker.ietf.org/wg/oauth/documents/ - as well as at least some of the non-RFC specifications that extend OAuth 2.0 via the OAuth registries at https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml, particularly [OAuth 2.0 Multiple Response Type Encoding Practices<https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html>]l>].  I’m pretty sure you intend that OAuth 2.1 keep using much of that widely deployed work and not replace it.  You should be clear about that.

Since you say that there are new features in OAuth 2.1, what are they and are they essential to the OAuth 2.1 goals?  Or if they’re not essential, could they more profitably be factored into another specification so that the new features can be used either with OAuth 2.0 and OAuth 2.1?  That might make the resulting messaging to developers much clearer.

                                                       Thanks,
                                                       -- Mike

From: Dick Hardt <dick.hardt@gmail.com<mailto:dick.hardt@gmail.com>>
Sent: Sunday, March 15, 2020 6:50 PM
To: Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>>
Cc: aaron@parecki.com<mailto:aaron@parecki.com>; torsten@lodderstedt.net<mailto:torsten@lodderstedt.net>; oauth@ietf.org<mailto:oauth@ietf.org>
Subject: [EXTERNAL] Re: Clarifying the scope of the OAuth 2.1 spec

Hi Mike

I like where you are going with this, but what do we mean when we say OAuth 2.0? Is it RFC 6749? What is the OAuth 2.0 set of protocols?

OAuth 2.1 includes features that are not in RFC 6749, so it is not a subset of that specification.
ᐧ

On Sun, Mar 15, 2020 at 2:34 PM Mike Jones <Michael.Jones@microsoft.com<mailto:Michael.Jones@microsoft.com>> wrote:
The abstract of draft-parecki-oauth-v2-1 concludes with this text:
   This specification replaces and obsoletes the OAuth 2.0 Authorization Framework described in RFC 6749<https://tools.ietf.org/html/rfc6749>49>.

While accurate, I don’t believe that this text captures the full intent of the OAuth 2.1 effort – specifically, to be a recommended subset of OAuth 2.0, rather than to introduce incompatible changes to it.  Therefore, I request that these sentences be added to the abstract, to eliminate confusion in the marketplace that might otherwise arise:

    OAuth 2.1 is a compatible subset of OAuth 2.0, removing features that are not currently considered to be best practices.  By design, it does not introduce any new features to what already exists in the OAuth 2.0 set of protocols.

                                                       Thanks,
                                                       -- Mike

P.S.  I assert that any incompatible changes should be proposed as part of the TxAuth effort and not as part of OAuth 2.1.