Re: [OAUTH-WG] OAuth 2.1 - drop implicit flow?

Justin Richer <jricher@mit.edu> Wed, 18 March 2020 12:56 UTC

Return-Path: <jricher@mit.edu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C6D73A152D for <oauth@ietfa.amsl.com>; Wed, 18 Mar 2020 05:56:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hs-OBP9qaIvs for <oauth@ietfa.amsl.com>; Wed, 18 Mar 2020 05:56:00 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34EDC3A152B for <oauth@ietf.org>; Wed, 18 Mar 2020 05:56:00 -0700 (PDT)
Received: from [192.168.1.5] (static-71-174-62-56.bstnma.fios.verizon.net [71.174.62.56]) (authenticated bits=0) (User authenticated as jricher@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 02ICtt2W026105 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 18 Mar 2020 08:55:56 -0400
From: Justin Richer <jricher@mit.edu>
Message-Id: <C931D7DE-DD10-4BAB-852B-3F7151839E0A@mit.edu>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A58297E5-228C-4403-81E1-6ABC0DD3F2EA"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 18 Mar 2020 08:55:55 -0400
In-Reply-To: <CAMVRk+JCruWcpp96iDVdCpLVo4pZkn312b48L9xbbb0b0BVaAQ@mail.gmail.com>
Cc: Vittorio Bertocci <Vittorio=40auth0.com@dmarc.ietf.org>, Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org>, oauth <oauth@ietf.org>
To: Jared Jennings <jaredljennings@gmail.com>
References: <CAD9ie-s9HT=9MKPK+GpVngZc+9QMxHS6KL-Sfq-UPQz2VQ3ioA@mail.gmail.com> <3F805BA8-8ABB-4939-96CC-FD2FEC811322@lodderstedt.net> <CAD9ie-sZOG0=pbFW72fZR3XtzsNFRFCyFmF5xeEPFUzHzdmHaQ@mail.gmail.com> <CA+k3eCRJMtAstvrNKPE4qAqU7TCFytrCZC8tHtupWno_J0xKbQ@mail.gmail.com> <CAD9ie-uiLS=f1QrHyQAAaq2YP=gPVFCtOawbKXwh4xG8adw=vQ@mail.gmail.com> <CA+k3eCQGqduvcOi_S6cp49NUkr4Rt1ws7Lb6t3SvVgceaHKbOQ@mail.gmail.com> <CAO_FVe4B45fQjOtUtFw+nthLn3RtaivPik9jHkC8Fqu1C3ovZg@mail.gmail.com> <CAMVRk+JCruWcpp96iDVdCpLVo4pZkn312b48L9xbbb0b0BVaAQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/REeoP3LwOkpqWIrxTyxnMUmOOac>
Subject: Re: [OAUTH-WG] OAuth 2.1 - drop implicit flow?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Mar 2020 12:56:03 -0000

OpenID Connect is based on OAuth 2.0, not on OAuth 2.1. Therefore, it would not be affected at all, whether through the hybrid or implicit flows.

If OIDC pushes a revision to OAuth 2.1, then it would be bound by the features of OAuth 2.1 and would need to contend with that. But until that happens, everything we do with OAuth 2.1 has literally no effect on OAuth 2.0 systems, including OIDC.

 — Justin

> On Mar 18, 2020, at 7:14 AM, Jared Jennings <jaredljennings@gmail.com> wrote:
> 
> I agree, but would add that as long as it says "this is being drop", but does not impact "that", then the reader can understand context. "This does not change support for implicit response that OpenID Connect (OIDC) makes use of".
> 
> my two cents.
> 
> -Jared
> Skype:jaredljennings
> Signal:+1 816.730.9540
> WhatsApp: +1 816.678.4152
> 
> 
> On Thu, Mar 12, 2020 at 1:15 PM Vittorio Bertocci <Vittorio=40auth0.com@dmarc.ietf.org <mailto:40auth0.com@dmarc.ietf.org>> wrote:
> Sorry for the delay here.
> From the formal perspective, Torsten's language works for me as well.  Thanks for taking the feedback into account.
> 
> I still worry that without an explicit reference to OIDC implicit+form_post, I will have the conversation "but can we still do this in OIDC now that implicit has been deprecated in OAuth?" countless times with customers, but I'm resigned to that anyway :)
> 
> 
> On Sat, Mar 7, 2020 at 3:36 PM Brian Campbell <bcampbell=40pingidentity.com@dmarc.ietf.org <mailto:40pingidentity.com@dmarc.ietf.org>> wrote:
> Sorry, was replying i. my phone on the weekend and trying to keep it quick. I meant that I thought Torsten's suggestion was good.
> 
> On Sat, Mar 7, 2020, 4:25 PM Dick Hardt <dick.hardt@gmail.com <mailto:dick.hardt@gmail.com>> wrote:
> Would you clarify what text works Brian?
> 
> On Sat, Mar 7, 2020 at 3:24 PM Brian Campbell <bcampbell@pingidentity.com <mailto:bcampbell@pingidentity.com>> wrote:
> Yeah, that works for me.. 
> 
> On Sat, Mar 7, 2020, 9:37 AM Dick Hardt <dick.hardt@gmail.com <mailto:dick.hardt@gmail.com>> wrote:
> Brian: does that meet your requirements?
> 
> If not, how about if we refer to OIDC as an example extension without saying it is implicit?
> ᐧ
> 
> On Sat, Mar 7, 2020 at 8:29 AM Torsten Lodderstedt <torsten@lodderstedt..net <mailto:torsten@lodderstedt.net>> wrote:
> I think keeping the response type as extension point and not mentioning implicit at all is sufficient to support Brian’s objective.
> 
>> Am 07.03.2020 um 17:06 schrieb Dick Hardt <dick.hardt@gmail.com <mailto:dick.hardt@gmail.com>>:
>> 
>> 
>> How about if we add in a nonnormative reference to OIDC as an explicit example of an extension:
>> 
>> "For example, OIDC defines an implicit grant with additional security features."
>> 
>> or similar language
>> ᐧ
>> 
>> On Sat, Mar 7, 2020 at 5:27 AM Brian Campbell <bcampbell@pingidentity.com <mailto:bcampbell@pingidentity.com>> wrote:
>> The name implicit grant is unfortunately somewhat misleading/confusing but, for the case at hand, the extension mechanism isn't grant type so much as response type and even response mode. 
>> 
>> The perspective shared during the office hours call was, paraphrasing as best I can, that there are legitimate uses of implicit style flows in OpenID Connect (that likely won't be updated) and it would be really nice if this new 2.1 or whatever it's going to be document didn't imply that they were disallowed or problematic or otherwise create unnecessary FUD or confusion for the large population of existing deployments.. 
>> 
>> On Fri, Feb 28, 2020 at 1:56 PM Dick Hardt <dick.hardt@gmail.com <mailto:dick.hardt@gmail..com>> wrote:
>> I'm looking to close out this topic. I heard that Brian and Vittorio shared some points of view in the office hours, and wanted to confirm:
>> 
>> + Remove implicit flow from OAuth 2.1 and continue to highlight that grant types are an extension mechanism.
>> 
>> For example, if OpenID Connect were to be updated to refer to OAuth 2.1 rather than OAuth 2..0, OIDC could define the implicit grant type with all the appropriate considerations.
>> 
>> 
>> ᐧ
>> 
>> On Tue, Feb 18, 2020 at 10:49 PM Dominick Baier <dbaier@leastprivilege.com <mailto:dbaier@leastprivilege.com>> wrote:
>> No - please get rid of it.
>> 
>> ———
>> Dominick Baier
>> 
>> On 18. February 2020 at 21:32:31, Dick Hardt (dick.hardt@gmail.com <mailto:dick.hardt@gmail.com>) wrote:
>> 
>>> Hey List 
>>> 
>>> (I'm using the OAuth 2.1 name as a placeholder for the doc that Aaron, Torsten, and I are working on)
>>> 
>>> Given the points Aaron brought up in
>>> 
>>> https://mailarchive.ietf.org/arch/msg/oauth/hXEfLXgEqrUQVi7Qy8X_279DCNU <https://mailarchive.ietf.org/arch/msg/oauth/hXEfLXgEqrUQVi7Qy8X_279DCNU>
>>> 
>>> 
>>> Does anyone have concerns with dropping the implicit flow from the OAuth 2.1 document so that developers don't use it?
>>> 
>>> /Dick
>>> _______________________________________________ 
>>> OAuth mailing list 
>>> OAuth@ietf.org <mailto:OAuth@ietf.org> 
>>> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth> 
>> 
>> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited.....  If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you.
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>
> 
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited....  If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you.
> 
> CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited....  If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you._______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth <https://www.ietf.org/mailman/listinfo/oauth>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth