Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Thu, 04 June 2020 14:26 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF5CE3A0CFA for <oauth@ietfa.amsl.com>; Thu, 4 Jun 2020 07:26:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.146
X-Spam-Level:
X-Spam-Status: No, score=0.146 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, LONGWORDS=2.035, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=VCIvTCsj; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=VCIvTCsj
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bfw-oPU-YcB6 for <oauth@ietfa.amsl.com>; Thu, 4 Jun 2020 07:26:24 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70053.outbound.protection.outlook.com [40.107.7.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6A97C3A0CEB for <oauth@ietf.org>; Thu, 4 Jun 2020 07:26:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G9BfX5d93qTv2pr2I90Pm/kz7exlvDFpJ5KEKCQ540w=; b=VCIvTCsjCRYGPa+yX/RpS7FMAV13JP7qPH3gDR9//rj9sNgkVfiYjD/1VkPALJdB53j+myTJ8qfRp+SZCZ/5uPthHCZ1iepHTuJs4jy6duAdNu48s65d9beYFAWgJSeO7WApl/oKHTXjclSMlEzCm5D9UUa4l1RJlOZ2jHj8dMs=
Received: from DB6PR0802CA0037.eurprd08.prod.outlook.com (2603:10a6:4:a3::23) by VI1PR0802MB2303.eurprd08.prod.outlook.com (2603:10a6:800:a7::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.20; Thu, 4 Jun 2020 14:26:17 +0000
Received: from DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:a3:cafe::17) by DB6PR0802CA0037.outlook.office365.com (2603:10a6:4:a3::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.19 via Frontend Transport; Thu, 4 Jun 2020 14:26:17 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT019.mail.protection.outlook.com (10.152.20.163) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18 via Frontend Transport; Thu, 4 Jun 2020 14:26:17 +0000
Received: ("Tessian outbound 4f5776643448:v59"); Thu, 04 Jun 2020 14:26:17 +0000
X-CR-MTA-TID: 64aa7808
Received: from 9463d92ccaa5.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id F01F5957-9503-4845-9119-C89277A3FFF1.1; Thu, 04 Jun 2020 14:26:12 +0000
Received: from EUR02-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 9463d92ccaa5.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 04 Jun 2020 14:26:12 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gHL+ak7TF6mZ9r0DmlHQYkxqqDwN0PE3wZGh52rGT+WnkXaureMZjpWcyI2HXAszNnqYFzsoFxIlLDSIsSp1RCv1bSgny0ud4ZySFWy3DB0YDN+4/miZrAPhuOp4tEyYlnUHQPDJfKuvtEcDitYObm3xF9d5VeXVLU1rigJcOhFH8lqZXRE1Lp3ENdzEpE8Wemj6vbq+4rQ0i1PAPTcjU30gPT9ae0ocDDrj+wGz4/KRRitEdeLbN+s3akaAZdMFZWZcIkRIki8hzMXkm3X9A5SS2Zk/WZ5i+v5OSioCy6BYTmMlVida8olCeuhpwoDTFygO812F9gEHIdpct96Low==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G9BfX5d93qTv2pr2I90Pm/kz7exlvDFpJ5KEKCQ540w=; b=Lm03h76Ac+31ULCkZTJ/1fN1nG+df85IdRB6JE4bnWqv0CqOFNULzYdIN2/EtrY96bM85DJ7396VybRq16scn9ZyCCBiSodpUpnSXS1/UBebGYB/Dyj7Aw6KJXWAp+x7iTabxI7gtZtKM8Ar7/Xz3re9T1CVeeZAFmMDuIH50s9xUSemENOMF3xvgjAWn7QqSFkAnNb0pwzHWkG3MeA6BFdjrUak5fG2epeFekkMTGLgUmJ09Wmb/4P6gS/QlNUdptpvGxjFGWOjS8uH7H9+OuDVX6JovHlai/l20xZ5n8o+C0EhoGDVSX5806CdPWe1Aix7XWRJEowkbktU6zzTGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G9BfX5d93qTv2pr2I90Pm/kz7exlvDFpJ5KEKCQ540w=; b=VCIvTCsjCRYGPa+yX/RpS7FMAV13JP7qPH3gDR9//rj9sNgkVfiYjD/1VkPALJdB53j+myTJ8qfRp+SZCZ/5uPthHCZ1iepHTuJs4jy6duAdNu48s65d9beYFAWgJSeO7WApl/oKHTXjclSMlEzCm5D9UUa4l1RJlOZ2jHj8dMs=
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com (2603:10a6:208:106::13) by AM0PR08MB3651.eurprd08.prod.outlook.com (2603:10a6:208:d4::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18; Thu, 4 Jun 2020 14:26:10 +0000
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::39f5:e4d9:51ff:eae]) by AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::39f5:e4d9:51ff:eae%7]) with mapi id 15.20.3066.018; Thu, 4 Jun 2020 14:26:10 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Denis <denis.ietf@free.fr>
CC: Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com>, Vittorio Bertocci <vittorio.bertocci@auth0.com>, "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"
Thread-Index: AQHWE1f9z2EgpsdZ60eoi9hyjcl/fqiQWrGAgAAd5wCAF3pgAIAAGgMAgB1ZqWCAAZGAAIAB1l6g
Date: Thu, 04 Jun 2020 14:26:10 +0000
Message-ID: <AM0PR08MB37161916ED0662F4CB2C736EFA890@AM0PR08MB3716.eurprd08.prod.outlook.com>
References: <CAGL6epKuHTqLrZEjm0goKV+3jaPfTkN_JSLc0jfQyPqNzeP3aA@mail.gmail.com> <125f32d3-dd3b-3add-1172-391acd831cde@free.fr> <MWHPR19MB150159025ECBAD75B6DDE1DFAEAD0@MWHPR19MB1501.namprd19.prod.outlook.com> <bf9e3682-f525-5ee7-8f34-033d6bce8a1d@free.fr> <CADNypP8vzG1HiQ5xmDAxdBrgZz3i8jUknCGeZcx6yutmFbs4-Q@mail.gmail.com> <AM0PR08MB37162721EE1CA10919B22500FA8B0@AM0PR08MB3716.eurprd08.prod.outlook.com> <24ffa213-1a09-f7d1-28f8-e1b678cf85d9@free.fr>
In-Reply-To: <24ffa213-1a09-f7d1-28f8-e1b678cf85d9@free.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 67019288-f9b0-440b-bb79-42a0c9761cb4.1
x-checkrecipientchecked: true
Authentication-Results-Original: free.fr; dkim=none (message not signed) header.d=none;free.fr; dmarc=none action=none header.from=arm.com;
x-originating-ip: [156.67.196.137]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: d16c250f-95e4-4455-98da-08d808933e9d
x-ms-traffictypediagnostic: AM0PR08MB3651:|VI1PR0802MB2303:
X-Microsoft-Antispam-PRVS: <VI1PR0802MB2303489CD76B42DD4EB4E40FFA890@VI1PR0802MB2303.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
x-forefront-prvs: 04244E0DC5
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: suzb/HHIeBal+bDPmsNE058cGZsSy2rOzqXMtcpQZ3Ko4smclS9hKv2pez0B1TSthk8Vv+voPyoFXoNY+0crY4t1Ud2LW5JxwKocOpSiVDw9iv2rqwkFzpmW43+8gyikRH03EPbyUlhV9/mTHA8PFniEpBYDiLw3ijk6u+8CueHQ2L0R7wIQEu7DukyEw3k3Wr1rBon/kVNSzW4EjP1pQfjEFvcYs6nvJ8oh9e0Uet04dLbSbIYf3x8yRthsHMQShf1BSdZjZqeuLT1+VccdzqKTdo2T/bDoxuXisiT45/iOlROED2l+Hd9QQ751mTdnoOCuBS/UCk+kSFYh7tD0kPOyW6EKTlExWWyPUn7o8VBh9p+q8SLdh8dq/1YpzUoifIHdYthZ5YZ/uQP9LqdEKuzQ9mqycZeB048tglIfTAQbaQgr/LAxw0QPv6r+mw21bIiCprTjBphoFLeWRpGIcg==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB3716.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(136003)(396003)(39860400002)(346002)(366004)(26005)(52536014)(966005)(66574014)(478600001)(166002)(4326008)(86362001)(18074004)(186003)(66476007)(2906002)(64756008)(53546011)(33656002)(8936002)(55016002)(83380400001)(8676002)(76116006)(5660300002)(9686003)(7696005)(316002)(66556008)(6916009)(30864003)(71200400001)(66446008)(6506007)(66946007)(9326002)(54906003)(15866825006)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM0PR08MB37161916ED0662F4CB2C736EFA890AM0PR08MB3716eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3651
Original-Authentication-Results: free.fr; dkim=none (message not signed) header.d=none;free.fr; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT019.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(136003)(346002)(376002)(396003)(39860400002)(46966005)(33656002)(26005)(6506007)(53546011)(186003)(70206006)(86362001)(70586007)(6862004)(166002)(8676002)(4326008)(81166007)(356005)(7696005)(47076004)(83380400001)(9326002)(82310400002)(8936002)(66574014)(82740400003)(33964004)(54906003)(478600001)(336012)(55016002)(9686003)(316002)(966005)(18074004)(30864003)(5660300002)(2906002)(52536014)(15866825006)(579004)(559001); DIR:OUT; SFP:1101;
X-MS-Office365-Filtering-Correlation-Id-Prvs: f2791ae4-84ba-4515-32ab-08d808933a27
X-Forefront-PRVS: 04244E0DC5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jun 2020 14:26:17.6565 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: d16c250f-95e4-4455-98da-08d808933e9d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2303
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/LfYt4Q6QJbf-xppIH0ECUnNIUhM>
Subject: Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2020 14:26:30 -0000

Hi Denis,

Please see my response below.


From: Denis <denis.ietf@free.fr>
Sent: Wednesday, June 3, 2020 12:12 PM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: Rifaat Shekh-Yusef <rifaat.s.ietf@gmail.com>; Vittorio Bertocci <vittorio.bertocci@auth0.com>; oauth@ietf.org
Subject: Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

Hi Hannes,
First of all, I do appreciate your efforts to attempt to get rid of the "MUST NOT" in the "Privacy considerations" section.

Let us look at the following proposed sentence:

    While this is technical possible, it is important to note that the OAuth 2.0 protocol does not aim to expose the content of the access token
    to the client. The access token is therefore, by design, considered to be opaque to the client".

In the context of this document, a detailed content of the JWT is expected and thus, if a client receives a JWT compliant to this profile
(and if the token is not encrypted which is most often the case) it will absolutely be sure to pick up any guaranteed field within the JWT.
So, in the context of this document, the access token cannot be considered to be opaque to the client.

[Hannes] Here we have a disconnect. The OAuth 2.0 design does not assume that the client inspects the access tokens if it flies by. This document could not change that.
The purpose of this document is actually quite simple: Those who want to use JWT as a format for access tokens they can use the claims described in this document. You are also free to use whatever format you want.




About the second paragraph, in the context of this document (besides the case where the JWT is encrypted), it is neither difficult,
nor impossible to parse the token.

About the second paragraph, let us look at the following proposed sentence in the context of this document :

    " Additionally, there is no guarantee that the access token is conveyed by value and the authorization server implementation may change
      the token format at any time ".

The argumentation that the token format may change at any point of time, while being valid in the general case, is invalid in the context of this document.
This JWT profile will be stable over time. This means that this quoted sentence is inappropriate in the context of this document.

[Hannes] Here is the issue. In a given deployment you do not know how the access token is encoded nor whether the claims are in this format. You don’t know whether the token is conveyed by reference or by value. Hence, why should we suddenly even give developers the impression that OAuth Clients should look at the token.



The third proposed paragraph is stating :

    " In scenarios where it is where it is desirable for the clients to obtain information transmitted in the access token, OAuth 2.0 token introspection
      may provide a useful tool to enable such functionality (proper authorization assumed) ".

RFC 7662 (OAuth 2.0 Token Introspection) is a protocol to be used by protected resources, but is not a protocol to be used by clients.
As indicated, in order to be usable, a "proper authorization" also needs to be managed. Besides the difficulty to support such a protocol for clients
and to twist its original usage as defined in RFC 7662, it is simpler to develop the code to examine the content of the JWT, since its content is guaranteed
to be stable over time.
[Hannes] While it may be simpler to inspect the access token, the use of token introspection is a better match for the OAuth architecture. We can talk about updating the token introspection RFC to also describe this use case, assuming there is interest.
The question in general will surface why the client should get access to the content of the access token in the first place. For those cases where information is passed to the client other mechanisms, such as the identity token in OIDC, have been developed.

The last proposed paragraph is the following:

   " Since the content of the access token is accessible to the resource server it is important to evaluate whether the resource server gained the proper entitlement
      to have access to any content received in form of claims, for example through user consent in some form, policies and agreements with the organization running
      the authorization servers, and so on. The policies and the user interfaces to enable this user consent are, however, part of a specific deployment and therefore
      outside the scope of this document ".

The sentence "for example through user consent in some form, policies and agreements with the organization running the authorization servers, and so on"
should be removed, since this example lets believe that the consent is handled by the authorizations servers while it might be handled by the resource servers.
[Hannes] The information is disclosed by the authorization server and hence the consent has to be with the authorization server.


The last proposed paragraph would be solution neutral if the example were removed. This would lead to the following sentence:

Since the content of the access token is accessible to the resource server it is important to evaluate whether the resource server gained the proper entitlement
to have access to any content received in form of claims. The policies and the user interfaces to enable this user consent are, however, part of a specific deployment
and therefore outside the scope of this document.

Finally, there are still two questions that have been raised but which have not yet been answered at this time:

  *   how can a client request a JWT compliant to this profile, and
  *   how can a client be confident that it got a JWT compliant to this profile ?

[Hannes] Regarding the two questions: It cannot and it was never the intention of this work.

Ciao
Hannes


Denis

Let me try to jump in here in order to make a proposal for the text in the privacy consideration section:

FROM:
6<https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-04#section-6>.  Privacy Considerations


   As JWT access tokens carry information by value, it now becomes
   possible for requestors and receivers to directly peek inside the
   token claims collection.  The client MUST NOT inspect the content of
   the access token: the authorization server and the resource server
   might decide to change token format at any time (for example by
   switching from this profile to opaque tokens) hence any logic in the
   client relying on the ability to read the access token content would
   break without recourse.  Nonetheless, authorization servers should
   not assume that clients will comply with the above.  Whenever client
   access to the access token content presents privacy issues for a
   given scenario, the authorization server should take explicit steps
   to prevent it as described below.

   In scenarios in which JWT access tokens are accessible to the end
   user, it should be evaluated whether the information can be accessed
   without privacy violations (for example, if an end user would simply
   access his or her own personal information) or if steps must be taken
   to enforce cofidentiality.  Possible measures include: encrypting the
   access token, encrypting the sensitive claims, omitting the sensitive
   claims or not using this profile, falling back on opaque access
   tokens.

   In every scenario, the content of the JWT access token will
   eventually be accessible to the resource server.  It's important to
   evaluate whether the resource server gained the proper entitlement to
   have access to any content received in form of claims, for example
   through user consent in some form, policies and agreements with the
   organization running the authorization servers, and so on.

TO:

6<https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-04#section-6>.  Privacy Considerations
   The design of OAuth 2.0 envisions that access tokens are created by
   authorization servers and consumed by resource servers.
   As JWT access tokens, as described in this document, carry information by value, it is
   possible for OAuth clients to peek inside the access token.
   While this is technical possible, it is important to note that the
   OAuth 2.0 protocol does not aim to expose the content of the
   access token to the client. The access token is therefore, by design, considered to be
   opaque to the client.

   A number of cases may make it difficult or impossible for clients to
   inspect the token, for example, the access token may be encrypted,
   the access token may contain vendor-specific claims that have not been
   standardized or have been standardized in other consortia making parsing
   of the token difficult. Additionally, there is no guarantee that the
   access token is conveyed by value and the authorization server implementation
   may change the token format at any time.

   In scenarios where it is desirable for the clients to obtain information
   transmitted in the access token, OAuth 2.0 token introspection may provide
   a useful tool to enable such functionality (proper authorization assumed).

   In scenarios where the content of the access token must not be readable
   by clients, encrypting the content of the access token is RECOMMENDED.

   Since the content of the access token is accessible to the resource server
   it is important to
   evaluate whether the resource server gained the proper entitlement to
   have access to any content received in form of claims, for example
   through user consent in some form, policies and agreements with the
   organization running the authorization servers, and so on. The policies
   and the user interfaces to enable this user consent are, however, part
   of a specific deployment and therefore outside the scope of this document.


How does this sound?

Ciao
Hannes



From: OAuth <oauth-bounces@ietf.org><mailto:oauth-bounces@ietf.org> On Behalf Of Rifaat Shekh-Yusef
Sent: Thursday, May 14, 2020 8:03 PM
To: Denis <denis.ietf@free.fr><mailto:denis.ietf@free.fr>
Cc: Vittorio Bertocci <vittorio.bertocci@auth0.com><mailto:vittorio.bertocci@auth0.com>; oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

Denis,

You are rehashing the same issues that you have already discussed on the mailing list multiple times,
You could not get the WG to agree with your points, because the WG believe that this issue is outside the scope of this document.

The best the chairs can do at this stage is to capture your point in the shepherd write-up to the IESG.
We think this document has the support of the WG and is ready to move forward.

Regards,
 Rifaat


On Thu, May 14, 2020 at 12:29 PM Denis <denis.ietf@free.fr<mailto:denis.ietf@free.fr>> wrote:
Hi Vittorio,

I am referring to the email you sent on April the 29 th which is copied below.

1) You wrote:
> targeting of access tokens
Let me think about that a bit longer.
I acknowledge that the decision of including an audience has the effect of letting the AS track when the client accesses a particular resource,
but at the same time that’s completely mainstream and very much by design in a very large number of cases. As such, I find the language
you are suggesting to be potentially confusing, as it positions this as an exception vs a privacy protecting mainstream that is in fact not common,
and ascribes to the client more latitude than I believe is legitimate to expect or grant.
I’ll try to come up with concise language that clarifies to the reader that the current mechanism does allow AS tracking.
Since the last draft has been published on the 27 th, you have not proposed any "concise language that clarifies to the reader
that the current mechanism does allow AS tracking".

2) You also wrote about the "sub" uniqueness:
As long as an identifier identifies one resource only, it satisfies uniqueness. It doesn’t have to be a singleton.
RFC 7519 defines in section 4.1.2 the semantics of the "sub" claim using the following sentence:
The subject value MUST either be scoped to be locally unique in the context of the issuer or be globally unique.
The text does NOT say that the subject value "MUST be scoped to be locally unique in the context of the resource server".
Changing the semantics of an already defined claim is not permitted. If you would like to have such a semantics available,
a new claim should be defined (and it would be very nice to have it !).

3) The text is the privacy considerations section states:

   Although the ability to correlate requests might be required by design in many scenarios, there are scenarios where the authorization
   server might want to prevent correlation to preserve the desired level of privacy.

In the real world, it is also clients or end-users which would like to prevent correlation to preserve their desired level of privacy.

A better sentence would be:

   Although the ability to correlate requests might be required by design in many scenarios, there are scenarios where the authorization
   server or the client might want to prevent correlation to preserve the desired level of privacy.

4) The text continues with:

   Authorization servers should choose how to assign "sub" values according to the level of privacy required by each
   situation.  For instance: if a solution requires preventing tracking  principal activities across multiple resource servers,
   the  authorization server should ensure that JWT access tokens meant for different resource servers have distinct "sub"
   values that cannot be correlated in the event of resource servers collusion.

Authorization servers are not necessarily able to choose the level of privacy required by each situation. When there are different
situations for the same resource server, the scope is (unfortunately at the moment) the only way to select the "level of privacy that is required".

The example ("For instance:") is only an example that provides a vague recommendation for the ASs which is NOT conformant
with the semantics of the "sub" claim as defined in RFC 7519.

What should be discussed here are not "examples" or what an authorization server should do, but explanations about the implications
for the end-user or for the client for the various values that can be placed into the "sub" claim by an AS. The problem is wider that simply
a collusion between resource servers, but also with other servers that DO NOT participate in any OAuth exchange.

RFC 6973 (Privacy Considerations) states in section 7 : Guidelines
This section provides guidance for document authors in the form of a questionnaire about a protocol being designed.
The questionnaire may be useful at any point in the design process, particularly after document authors have developed
a high-level protocol model as described in [RFC4101].
One of the questions is:
f.  Correlation.  Does the protocol allow for correlation of identifiers ?  Are there expected ways that information exposed
by the protocol will be combined or correlated with information obtained outside the protocol ?
It is important to provide an answer to these two questions.

Hereafter is some text that is fully conformant with RFC 7519 which should be incorporated into the privacy considerations section
which explains the implications of the two (and only two) flavours of the "sub" claim.
When the sub claim contains a locally unique identifier in the context of the issuer, this allows the tracking of principal activities
across multiple resource servers.

When the sub claim contains a globally unique identifier, this allows to correlate principal activities across multiple resource
servers, while in addition, this globally unique identifier may also allow to correlate the principal activities on servers where
no access has been performed by the principals to these servers but where the same globally unique identifiers are being used
by these servers.
Denis
Thanks Denis for the thorough commentary.

> The title of this spec.
Fixed, thanks!

> The client MUST NOT inspect the content of the access token
This is really a sticky point. I really want to acknowledge your PoV on this, but at the same time I found this to be one of the biggest sources of issues in the use of JWT for access tokens hence I feel we really need to give solid guidance here. Let me expand further on the reasoning behind it, and perhaps we can get to language that satisfies both PoVs.
To me the key point is that clients should not write code that inspects access tokens. Taking a dependency on the ability to do so is ignoring fundamental information about the architecture and relationships between OAuth roles, and suggests an ability of the client to understand the semantic of the content that cannot be assumed in the general case. I expanded on the details in my former reply to you on this topic, I would recommend referring to it. Clients violating this simple principle has been one of the most common sources of production issues I had to deal with in the past few years, and one of the hardest to remediate given that clients are hard to update and sometimes the things they relied on were irremediably lost. This is why I am inclined to put in here strong language.
That said: I have nothing against client developers examining a network trace and drawing conclusions based on the content of what they see. That doesn’t create any hard dependencies and has no implications in respect to changes in the solution behavior. However I am not sure how to phrase that in the specification, given that referring to the client inevitably refers to its code. I am open to suggestions.

>  3)…
I have a pretty hard time following the chain of reasoning in this section. Let me attempt to tackle it to the best of my understanding.
I think the key might be
> a client should be able to choose whether it wishes the sub claim to contain [..]
I don’t think that should be a choice left to the client. In business systems, my experience is that the type of identifiers to be used (when the IdP gives any choice at all)  is established at resource provisioning time. I am not aware of mechanisms thru which a client signals the nature of the identifier to be used, nor that would be fully feasible (the resource knows what it needs to perform its function).
Furthermore:
> which has nothing to do with uniqueness since the value changes for every generated token.
Again, this is something that was touched on in my former reply to your message. As long as an identifier identifies one resource only, it satisfies uniqueness. It doesn’t have to be a singleton.
Finally, the scope is optional (for good reasons: 1st party and non delegation scenarios don’t require it) hence it cannot be relied upon for properties that should hold in every scenario.
In summary: per the preceding thread on this topic, the consensus was that varying the sub content was a satisfactory way of protecting against correlation. I don’t a gree that clients should have a mechanism to request different sub flavors, as that decision should be done out of band by the AS and RS; and the scope isn’t always available anyway.
> targeting of access tokens
Let me think about that a bit longer.
I acknowledge that the decision of including an audience has the effect of letting the AS track when the client accesses a particular resource, but at the same time that’s completely mainstream and very much by design in a very large number of cases. As such, I find the language you are suggesting to be potentially confusing, as it positions this as an exception vs a privacy protecting mainstream that is in fact not common, and ascribes to the client more latitude than I believe is legitimate to expect or grant.
I’ll try to come up with concise language that clarifies to the reader that the current mechanism does allow AS tracking.

From: OAuth <oauth-bounces@ietf.org><mailto:oauth-bounces@ietf.org> on behalf of Denis <denis.ietf@free.fr><mailto:denis.ietf@free.fr>
Date: Wednesday, April 29, 2020 at 09:12
To: "oauth@ietf.org"<mailto:oauth@ietf.org> <oauth@ietf.org><mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens"

You will find four comments numbered 1) to 4).
1) The title of this spec. is:

JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens

So, this spec. is supposed to be targeted to OAuth 2.0.  However, the header at the top of the page omits to mention it.

Currently, it is :
Internet-Draft       OAuth Access Token JWT Profile           April 2020
It should rather be:
Internet-Draft       OAuth 2.0 Access Token JWT Profile           April 2020

2) The following text is within section 6.

The client MUST NOT inspect the content of
the access token: the authorization server and the resource server
might decide to change token format at any time (for example by
switching from this profile to opaque tokens) hence any logic in the
client relying on the ability to read the access token content would
break without recourse.
Nonetheless, authorization servers should
not assume that clients will comply with the above.
It is of a primary importance that clients MAY be able to inspect tokens before transmitting them.
The "MUST NOT" is not acceptable.
The above text should be replaced with:

Reading the access token content may be useful for the user to verify that
the access token content matches with its expectations.  However,
the authorization server and the resource server might decide to change the
token format at any time.  Thus, the client should not expect to always be
in a position to read the access token content.

The remaining of the text about this topic is fine.


3) The next topic is about the sub claim.

The text states:

Although the ability to correlate requests might be required by
design in many scenarios, there are scenarios where the authorization
server might want to prevent correlation to preserve the desired
level of privacy. Authorization servers should choose how to assign
sub values according to the level of privacy required by each
situation.

I have a set of questions:

  1.  How can authorization servers choose how to assign sub values according to the level of privacy required "by each situation" ?
  2.  How can authorization servers know the level of privacy required "by each situation" ?
  3.  How can the users be informed of the level of privacy required "by each situation" ?
  4.  How can the users consent with the level of privacy required "by each situation" ?
Currently, the request MUST include either a resource parameter or an aud claim parameter, while it MAY include a scope parameter.
The syntax of the scope parameter is a list of space-delimited, case-sensitive strings (RFC 6749). It is thus subject to private agreements
between clients and Authorization Servers. Since the scope is being returned, it is a primary importance that the returned scope matches
with its expectations before transmitting the token to a Resource Server.

In theory, a client should be able to choose whether it wishes the sub claim to contain :

  *   a global unique identifier for all ASs ("globally unique"),
  *   a unique identifier for each AS ("locally unique in the context of the issuer"),
  *   a different pseudonym for each RS, or
  *   a different pseudonym for each authorization token request.
The only variable parameter that it can use for this purpose in the token request is the scope parameter.

RFC 7519 states is section 4.1.2:

The subject value MUST either be scoped to be locally unique in the context of the issuer
or be globally unique.

It is quite hard to recognize that the sub claim is able to carry a different pseudonym for each RS, i.e. for case (c), or
a different pseudonym for each authorization token request, i.e. for case (d), which has nothing to do with uniqueness
since the value changes for every generated token.

This has implications about the following text:

For instance: if a solution requires preventing tracking
principal activities across multiple resource servers, the
authorization server should ensure that JWT access tokens meant for
different resource servers have distinct sub values that cannot be
correlated in the event of resource servers collusion.

Since it addresses case (c).

and also about the following text:

4.b) Similarly: if a solution requires preventing a resource server from
correlating the principal’s activity within the resource itself, the
authorization server should assign different sub values for every JWT
access token issued.

Since it addresses case (d).

This means that the current text placed in the privacy considerations section was a good attempt to address the case,
but that the text needs to be revised.

Proposed text replacement for all the previously quoted sentences:

According to RFC 7519 (4.1.2): The subject value MUST either be scoped to be locally unique in the context of the issuer or be globally unique.

When the sub claim contains a globally unique identifier, this allows to correlate principal activities across multiple resource servers, while in addition,
this globally unique identifier may also allow to correlate the principal activities on servers where no access has been performed by the principals
to these servers but where the same globally unique identifiers are being used by these servers.

When the sub claim contains a locally unique identifier in the context of the issuer, this also allows the tracking of principal activities across multiple resource servers.

The scope request parameter is the only way to influence on the content of the sub claim parameter. Its meaning is subject to a private agreement
between the client and the AS, which means that the use of the scope parameter is the only way to choose between a locally unique identifier
in the context of the issuer or a globally unique identifier.

Since the scope parameter is being returned, it is a primary importance that the returned scope matches with the expectations of the client before transmitting
the token to a Resource Server.

However, there are other cases where the client would like to be able to choose whether it wishes the sub claim to contain :
    - a different pseudonym for each RS so that different resource servers will be unable to correlate its activities, or
    - a different pseudonym for each authorization token request, so that the same resource server cannot correlate its activities performed at different instant of time.

Considering the semantics of the sub claim, these two cases cannot be currently supported.


4) The next topic is about the targeting of access tokens
Text had been proposed before the last conference call. Then, the topic has been presented at the very end of the last conference call, but no text has been included
in the next draft.
Here is a revised text be included in the privacy considerations section:
For security reasons, some clients may be willing to target their access tokens but, for privacy reasons, may be unwilling to disclose to Authorization Servers
an identification of the Resource Servers they are going to access, so that Authorization Servers will be unable to know which resources servers are being accessed.
The disclosure of the Resource Servers names allows the Authorization Servers to list all the Resource Servers being access by all its users and in addition to list pairs
of (Principal, Resource Servers) which allow to trace all the users accesses to Resource Servers performed through a given Authorization Server. When a token is targeted,
this profile does not contain provisions to address these two threats.

Denis
Hi all,

This is a second working group last call for "JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens".

Here is the document:
https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-06

Please send your comments to the OAuth mailing list by April 29, 2020.

Regards,
 Rifaat & Hannes



_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf.org/mailman/listinfo/oauth




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.



IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.