From nobody Sat Aug 29 08:25:35 2020
Return-Path: <jricher@mit.edu>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id E6FB13A0C67;
 Sat, 29 Aug 2020 08:25:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level: 
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, HTML_FONT_LOW_CONTRAST=0.001,
 HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001,
 SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
 autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id PylE4rlmuzm6; Sat, 29 Aug 2020 08:25:32 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 356AE3A0C68;
 Sat, 29 Aug 2020 08:25:31 -0700 (PDT)
Received: from [172.16.101.121] (50-245-27-6-static.hfc.comcastbusiness.net
 [50.245.27.6]) (authenticated bits=0)
 (User authenticated as jricher@ATHENA.MIT.EDU)
 by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 07TFPS3p012864
 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);
 Sat, 29 Aug 2020 11:25:28 -0400
From: Justin Richer <jricher@mit.edu>
Message-Id: <08D01F36-367B-4F23-9602-9C2A2AE49DA3@mit.edu>
Content-Type: multipart/alternative;
 boundary="Apple-Mail=_46FEE9FA-AFDF-4BE5-8C7B-E47CC6C1A598"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
Date: Sat, 29 Aug 2020 11:25:27 -0400
In-Reply-To: <CAD9ie-uqeM5jwQKuvO+X4NC5oXZkoLrRu1NWC2rrE4CD=ypa+g@mail.gmail.com>
Cc: Torsten Lodderstedt <torsten=40lodderstedt.net@dmarc.ietf.org>,
 Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>,
 "last-call@ietf.org" <last-call@ietf.org>, oauth <oauth@ietf.org>
To: Dick Hardt <dick.hardt@gmail.com>
References: <CH2PR00MB0678DA2BC7234C2AC1CE784DF5541@CH2PR00MB0678.namprd00.prod.outlook.com>
 <412A63AD-DDE1-4BFE-8234-5A721A0ED88D@lodderstedt.net>
 <D68FCD40-7365-446A-9F64-2BB59C11B7AE@mit.edu>
 <CAD9ie-uqeM5jwQKuvO+X4NC5oXZkoLrRu1NWC2rrE4CD=ypa+g@mail.gmail.com>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Sz3MrCQ7qOJUHkCZIKA-8M0sirk>
Subject: Re: [OAUTH-WG] Last Call:
 <draft-ietf-oauth-jwt-introspection-response-09.txt> (JWT Response for
 OAuth Token Introspection) to Proposed Standard
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>,
 <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>,
 <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 29 Aug 2020 15:25:34 -0000


--Apple-Mail=_46FEE9FA-AFDF-4BE5-8C7B-E47CC6C1A598
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Thanks, Dick. I agree with removing the excess parenthetical, but I =
intentionally avoided using a lowercase =E2=80=9Cmay=E2=80=9D in the =
middle of the text  (in favor of =E2=80=9Ccan=E2=80=9D) to avoid =
normative-sounding non-normative language, so I=E2=80=99d recommend that =
change be kept:

Implementers should be aware that a token introspection request lets the =
AS know when the client=20
    is accessing the RS, which can also indicate when the user is using=20=

    the client. If this implication is not acceptable, implementers can =
use other means to carry=20
    access token data, e.g. directly transferring the data needed by the =
RS within the access token.

> On Aug 27, 2020, at 12:15 PM, Dick Hardt <dick.hardt@gmail.com> wrote:
>=20
> Here is a crisper revision.
>=20
> Implementers should be aware that a token introspection request lets =
the AS know when the client=20
>     is accessing the RS, which may indicate when the user is using=20
>     the client. If this implication is not acceptable, implementers =
can use other means to carry=20
>     access token data, e.g. directly transferring the data needed by =
the RS within the access token.
> =E1=90=A7
>=20
> On Thu, Aug 27, 2020 at 7:19 AM Justin Richer <jricher@mit.edu =
<mailto:jricher@mit.edu>> wrote:
> I would clarify that this doesn=E2=80=99t necessarily say that the =
user=E2=80=99s there, and remove the normative requirement (which =
doesn=E2=80=99t have enforceable teeth in this context):
>=20
> Implementers should be aware that a token introspection request lets =
the AS know when the client=20
>     (and potentially the user) is accessing the RS, which can also =
indicate when the user is using=20
>     the client. If this implication is not acceptable, implementers =
can use other means to carry=20
>     access token data, e.g. directly transferring the data needed by =
the RS within the access token.
>=20
>=20
>  =E2=80=94 Justin
>=20
>> On Aug 27, 2020, at 9:48 AM, Torsten Lodderstedt =
<torsten=3D40lodderstedt.net@dmarc.ietf.org =
<mailto:torsten=3D40lodderstedt.net@dmarc.ietf.org>> wrote:
>>=20
>> Will the following text work for you?
>>=20
>> Implementers should be aware that a token introspection request lets =
the AS know when the client=20
>>     (and potentially the user) is accessing the RS, which is also an =
indication of when the user is using=20
>>     the client. If this impliction is not accepatable, implementars =
MUST use other means to carry=20
>>     access token data, e.g. directly transferring the data needed by =
the RS within the access token.
>>=20
>>=20
>>> On 26. Aug 2020, at 23:12, Mike Jones =
<Michael.Jones=3D40microsoft.com@dmarc.ietf.org =
<mailto:Michael.Jones=3D40microsoft.com@dmarc.ietf.org>> wrote:
>>>=20
>>> I agree with Dick=E2=80=99s observation about the privacy =
implications of using an Introspection Endpoint.  That=E2=80=99s why =
it=E2=80=99s preferable to not use one at all and instead directly have =
the Resource understand the Access Token.  One way of doing this is the =
JWT Access Token spec.  There are plenty of others.
>>>=20
>>> The downsides of using an Introspection Endpoint should be described =
in the Privacy Considerations section.
>>>=20
>>>                                                       -- Mike
>>>=20
>>> From: OAuth <oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org>> =
On Behalf Of Dick Hardt
>>> Sent: Wednesday, August 26, 2020 9:52 AM
>>> To: Torsten Lodderstedt <torsten=3D40lodderstedt.net@dmarc.ietf.org =
<mailto:torsten=3D40lodderstedt.net@dmarc.ietf.org>>
>>> Cc: last-call@ietf.org <mailto:last-call@ietf.org>; oauth =
<oauth@ietf.org <mailto:oauth@ietf.org>>
>>> Subject: Re: [OAUTH-WG] Last Call: =
<draft-ietf-oauth-jwt-introspection-response-09.txt> (JWT Response for =
OAuth Token Introspection) to Proposed Standard
>>>=20
>>>=20
>>>=20
>>> On Wed, Aug 26, 2020 at 4:37 AM Torsten Lodderstedt =
<torsten=3D40lodderstedt.net@dmarc.ietf.org =
<mailto:torsten=3D40lodderstedt.net@dmarc.ietf.org>> wrote:
>>> Hi Denis,
>>>=20
>>>> On 25. Aug 2020, at 16:55, Denis <denis.ietf@free.fr =
<mailto:denis.ietf@free.fr>> wrote:
>>>=20
>>>> The fact that the AS will know exactly when the introspection call =
has been made and thus be able to make sure which client=20
>>>> has attempted perform an access to that RS and at which instant of =
time. The use of this call allows an AS to track where and when=20
>>>> its clients have indeed presented an issued access token.
>>>=20
>>> That is a fact. I don=E2=80=99t think it is an issue per se. Please =
explain the privacy implications.
>>>=20
>>> As I see it, the privacy implication is that the AS knows when the =
client (and potentially the user) is accessing the RS, which is also an =
indication of when the user is using the client.
>>>=20
>>> I think including this implication would be important to have in a =
Privacy Considerations section.
>>>=20
>>> /Dick
>>> =E1=90=A7
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org <mailto:OAuth@ietf.org>
>> https://www.ietf.org/mailman/listinfo/oauth =
<https://www.ietf.org/mailman/listinfo/oauth>
>=20


--Apple-Mail=_46FEE9FA-AFDF-4BE5-8C7B-E47CC6C1A598
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Thanks, Dick. I agree with removing the excess parenthetical, =
but I intentionally avoided using a lowercase =E2=80=9Cmay=E2=80=9D in =
the middle of the text&nbsp;&nbsp;(in favor of =E2=80=9Ccan=E2=80=9D)&nbsp=
;to avoid normative-sounding non-normative language, so I=E2=80=99d =
recommend that change be kept:<div class=3D""><br class=3D""></div><div =
class=3D"">Implementers should be aware that a token introspection =
request lets the AS know when the&nbsp;client&nbsp;<br class=3D"">&nbsp; =
&nbsp; is accessing the RS, which can also indicate when the user is =
using&nbsp;<br class=3D"">&nbsp; &nbsp; the client. If this implication =
is not acceptable, implementers can use other means to carry&nbsp;<br =
class=3D"">&nbsp; &nbsp; access token data, e.g. directly transferring =
the data needed by the RS within the access token.</div><div =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On Aug 27, 2020, at 12:15 PM, Dick Hardt &lt;<a =
href=3D"mailto:dick.hardt@gmail.com" =
class=3D"">dick.hardt@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><meta =
http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf-8" =
class=3D""><div dir=3D"ltr" class=3D""><div class=3D"">Here is a crisper =
revision.</div><div class=3D""><br class=3D""></div>Implementers should =
be aware that a token introspection request lets the AS know when the =
client <br class=3D"">&nbsp; &nbsp; is accessing the RS, which =
may&nbsp;indicate when the user is using <br class=3D"">&nbsp; &nbsp; =
the client. If this implication is not acceptable, implementers can use =
other means to carry <br class=3D"">&nbsp; &nbsp; access token data, =
e.g. directly transferring the data needed by the RS within the access =
token.<br class=3D""></div><div hspace=3D"streak-pt-mark" =
style=3D"max-height:1px" class=3D""><img alt=3D"" =
style=3D"width:0px;max-height:0px;overflow:hidden" =
src=3D"https://mailfoogae.appspot.com/t?sender=3DaZGljay5oYXJkdEBnbWFpbC5j=
b20%3D&amp;type=3Dzerocontent&amp;guid=3D1735a3f9-ba59-4ca7-83ff-6d8ab827e=
dc9" class=3D""><font color=3D"#ffffff" size=3D"1" =
class=3D"">=E1=90=A7</font></div><br class=3D""><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Thu, Aug =
27, 2020 at 7:19 AM Justin Richer &lt;<a href=3D"mailto:jricher@mit.edu" =
class=3D"">jricher@mit.edu</a>&gt; wrote:<br class=3D""></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex"><div style=3D"overflow-wrap: =
break-word;" class=3D"">I would clarify that this doesn=E2=80=99t =
necessarily say that the user=E2=80=99s there, and remove the normative =
requirement (which doesn=E2=80=99t have enforceable teeth in this =
context):<div class=3D""><br class=3D""></div><div class=3D"">Implementers=
 should be aware that a token introspection request lets the AS know =
when the&nbsp;client&nbsp;<br class=3D"">&nbsp; &nbsp; (and potentially =
the user) is accessing the RS, which <b class=3D"">can also indicate</b> =
when the user is&nbsp;using&nbsp;<br class=3D"">&nbsp; &nbsp; the =
client. If this implication is not acceptable, <b class=3D"">implementers =
can use other means</b> to carry&nbsp;<br class=3D"">&nbsp; &nbsp; =
access token data, e.g. directly transferring the data needed by the RS =
within the access token.<br class=3D""><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div =
class=3D"">&nbsp;=E2=80=94 Justin</div><div class=3D""><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D"">On Aug =
27, 2020, at 9:48 AM, Torsten Lodderstedt &lt;<a =
href=3D"mailto:torsten=3D40lodderstedt.net@dmarc.ietf.org" =
target=3D"_blank" =
class=3D"">torsten=3D40lodderstedt.net@dmarc.ietf.org</a>&gt; =
wrote:</div><br class=3D""><div class=3D""><div class=3D"">Will the =
following text work for you?<br class=3D""><br class=3D"">Implementers =
should be aware that a token introspection request lets the AS know when =
the client <br class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;(and potentially the =
user) is accessing the RS, which is also an indication of when the user =
is using <br class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;the client. If this =
impliction is not accepatable, implementars MUST use other means to =
carry <br class=3D""> &nbsp;&nbsp;&nbsp;&nbsp;access token data, e.g. =
directly transferring the data needed by the RS within the access =
token.<br class=3D""><br class=3D""><br class=3D""><blockquote =
type=3D"cite" class=3D"">On 26. Aug 2020, at 23:12, Mike Jones &lt;<a =
href=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ietf.org" =
target=3D"_blank" =
class=3D"">Michael.Jones=3D40microsoft.com@dmarc.ietf.org</a>&gt; =
wrote:<br class=3D""><br class=3D"">I agree with Dick=E2=80=99s =
observation about the privacy implications of using an Introspection =
Endpoint.&nbsp; That=E2=80=99s why it=E2=80=99s preferable to not use =
one at all and instead directly have the Resource understand the Access =
Token.&nbsp; One way of doing this is the JWT Access Token spec.&nbsp; =
There are plenty of others.<br class=3D""><br class=3D"">The downsides =
of using an Introspection Endpoint should be described in the Privacy =
Considerations section.<br class=3D""><br class=3D""> =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;-- Mike<br class=3D""><br class=3D"">From: =
OAuth &lt;<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank" =
class=3D"">oauth-bounces@ietf.org</a>&gt; On Behalf Of Dick Hardt<br =
class=3D"">Sent: Wednesday, August 26, 2020 9:52 AM<br class=3D"">To: =
Torsten Lodderstedt &lt;<a =
href=3D"mailto:torsten=3D40lodderstedt.net@dmarc.ietf.org" =
target=3D"_blank" =
class=3D"">torsten=3D40lodderstedt.net@dmarc.ietf.org</a>&gt;<br =
class=3D"">Cc: <a href=3D"mailto:last-call@ietf.org" target=3D"_blank" =
class=3D"">last-call@ietf.org</a>; oauth &lt;<a =
href=3D"mailto:oauth@ietf.org" target=3D"_blank" =
class=3D"">oauth@ietf.org</a>&gt;<br class=3D"">Subject: Re: [OAUTH-WG] =
Last Call: &lt;draft-ietf-oauth-jwt-introspection-response-09.txt&gt; =
(JWT Response for OAuth Token Introspection) to Proposed Standard<br =
class=3D""><br class=3D""><br class=3D""><br class=3D"">On Wed, Aug 26, =
2020 at 4:37 AM Torsten Lodderstedt &lt;<a =
href=3D"mailto:torsten=3D40lodderstedt.net@dmarc.ietf.org" =
target=3D"_blank" =
class=3D"">torsten=3D40lodderstedt.net@dmarc.ietf.org</a>&gt; wrote:<br =
class=3D"">Hi Denis,<br class=3D""><br class=3D""><blockquote =
type=3D"cite" class=3D"">On 25. Aug 2020, at 16:55, Denis &lt;<a =
href=3D"mailto:denis.ietf@free.fr" target=3D"_blank" =
class=3D"">denis.ietf@free.fr</a>&gt; wrote:<br =
class=3D""></blockquote><br class=3D""><blockquote type=3D"cite" =
class=3D"">The fact that the AS will know exactly when the introspection =
call has been made and thus be able to make sure which client <br =
class=3D"">has attempted perform an access to that RS and at which =
instant of time. The use of this call allows an AS to track where and =
when <br class=3D"">its clients have indeed presented an issued access =
token.<br class=3D""></blockquote><br class=3D"">That is a fact. I =
don=E2=80=99t think it is an issue per se. Please explain the privacy =
implications.<br class=3D""><br class=3D"">As I see it, the privacy =
implication is that the AS knows when the client (and potentially the =
user) is accessing the RS, which is also an indication of when the user =
is using the client.<br class=3D""><br class=3D"">I think including this =
implication would be important to have in a Privacy Considerations =
section.<br class=3D""><br class=3D"">/Dick<br class=3D"">=E1=90=A7<br =
class=3D""></blockquote><br =
class=3D"">_______________________________________________<br =
class=3D"">OAuth mailing list<br class=3D""><a =
href=3D"mailto:OAuth@ietf.org" target=3D"_blank" =
class=3D"">OAuth@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/oauth</a><br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></div></blockquote></div>
</div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_46FEE9FA-AFDF-4BE5-8C7B-E47CC6C1A598--

