Re: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession

Kathleen Moriarty <> Wed, 25 November 2015 01:42 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 4B65B1ACD31 for <>; Tue, 24 Nov 2015 17:42:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id E1IiYigygxj9 for <>; Tue, 24 Nov 2015 17:42:27 -0800 (PST)
Received: from ( [IPv6:2a00:1450:400c:c09::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 700C21ACD2F for <>; Tue, 24 Nov 2015 17:42:27 -0800 (PST)
Received: by wmuu63 with SMTP id u63so119416273wmu.0 for <>; Tue, 24 Nov 2015 17:42:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=cHYOBRblHiJ61t+Pnxdj5ICUn07NFHhXu/HlmUzYEsQ=; b=ieuPodnXpSLQhFZw3SWky6/4VvAAW/6vvGB34c84jC6nnllGJVSXhhcezGvSYL0KJf Xl90MZxWP5CRP12S0N663C7N1jj1MaeQqwSyKCUnNDdgA+EFztLr9WobH/Ie2T/V1+c9 X6rJg3z/9xYPod3zNEuUHzn1/PRerL8S01Thpfz1v8R3SXULNsufYo4T6eGER87Dquym A/fCNKGseU/ps2GZIUqRGPy3UzfJv5IzWK1h3s4Lwo9wwSd8Y9aCpvxCUzUcd5/xuhQG qWyec4kWi1x5mnZhSjoQrZUWQIoGN1g8ZhrbVBCl1ZAVL54IcHvNEjhQJyF12s/B7K27 51pA==
MIME-Version: 1.0
X-Received: by with SMTP id t4mr39828187wjy.51.1448415746059; Tue, 24 Nov 2015 17:42:26 -0800 (PST)
Received: by with HTTP; Tue, 24 Nov 2015 17:42:26 -0800 (PST)
In-Reply-To: <>
References: <> <>
Date: Tue, 24 Nov 2015 20:42:26 -0500
Message-ID: <>
From: Kathleen Moriarty <>
To: Justin Richer <>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <>
Cc: "<>" <>
Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 25 Nov 2015 01:42:29 -0000

Thanks for a quick reply, Justin.

On Tue, Nov 24, 2015 at 1:48 PM, Justin Richer <> wrote:
> I suggest removal of the reference to bearer tokens in this section, since that seems to suggest that this is what the RS should do in such a case. What’s really going to happen is that an RS is going to get a request with this token and it’s going to have to figure out how to deal with it. If there’s a signature (like in http-message-signing) then it’s going to need to find the key. If it can’t read the key out of the cnf claim then it won’t be able to validate the signature and won’t process the message. If that’s the case then this RS can’t accept this token.

If this is the case, handling text would be helpful in the draft.

> This has nothing to do with bearer tokens vs. PoP tokens. It’s not really any different from an RS accepting JWT bearer tokens needing to be able to parse or process the JWT bearer token to figure out what it’s good for. Right?

If this is the case, new text would be helpful, it's a little
confusing as-is and I would assume what you assume above too.

Hopefully, new text is a simple fix as I'd like to start IETF last
call soon on this and the architecture draft (as in this week soon).

>  — Justin
>> On Nov 24, 2015, at 12:44 PM, Kathleen Moriarty <> wrote:
>> Hi,
>> Thank you all for your work on this draft!  I just have a few questions:
>> 1. Security considerations section says:
>> "All of the normal security issues, especially in relationship to
>>   comparing URIs and dealing with unrecognized values, that are
>>   discussed in JWT [JWT] also apply here."
>> I find that to be odd phrasing that would likely be picked up in
>> subsequent reviews.  Please remove the word "normal" so that all of
>> the security issues discusses in JWT are included.  Are there other
>> 'normal considerations in addition to those in JWT that need to be
>> listed?  The phrasing reads as if that may the case and would be
>> better to include them all or pointers or change the phrasing.
>> 2. Also in the security considerations section,
>>   "A recipient may not understand the newly introduced "cnf" claim and
>>   may consequently treat it as a bearer token."
>> What is the proper handling requirement when an unknown claim is
>> present?  Section 3.1 says:
>>  "When a recipient receives a "cnf" claim with a
>>   member that it does not understand, it MUST ignore that member."
>> Is this why it is treated as a bearer token rather than being
>> rejected?  Is this really the action you want to see with cnf?  Why
>> isn't there an error and a resend as a bearer token so that parties
>> understand (or have an opportunity to understand) that there were
>> issues?
>> Then the following text in the security section says:
>>  "While this is a
>>   legitimate concern, it is outside the scope of this specification,
>>   since demonstration the possession of the key associated with the
>>   "cnf" claim is not covered by this specification. For more details,
>> How is this outside of the scope of this draft?  cnf is defined in
>> this draft, so handling should be covered in this draft.  A pointer to
>> the POP architecture draft is not helpful as it is not defined there,
>> it's covered int his draft.  Should this text just be removed and
>> replaced with more explicit handling information int he body of this
>> draft?
>> Thanks!
>> --
>> Best regards,
>> Kathleen
>> _______________________________________________
>> OAuth mailing list


Best regards,