Re: [OAUTH-WG] [Errata Held for Document Update] RFC6819 (4267)

"Phil Hunt (IDM)" <phil.hunt@oracle.com> Thu, 17 December 2015 14:03 UTC

Return-Path: <phil.hunt@oracle.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF2641B2D0B; Thu, 17 Dec 2015 06:03:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PjLfRYJPIgsv; Thu, 17 Dec 2015 06:03:20 -0800 (PST)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63B581B2DEC; Thu, 17 Dec 2015 06:03:19 -0800 (PST)
Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id tBHE3DWt030882 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 17 Dec 2015 14:03:14 GMT
Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0022.oracle.com (8.13.8/8.13.8) with ESMTP id tBHE3DsE011726 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Thu, 17 Dec 2015 14:03:13 GMT
Received: from abhmp0017.oracle.com (abhmp0017.oracle.com [141.146.116.23]) by userv0121.oracle.com (8.13.8/8.13.8) with ESMTP id tBHE3COJ030456; Thu, 17 Dec 2015 14:03:12 GMT
Received: from [192.168.2.104] (/93.216.71.75) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 17 Dec 2015 06:03:11 -0800
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (1.0)
From: "Phil Hunt (IDM)" <phil.hunt@oracle.com>
X-Mailer: iPhone Mail (13C75)
In-Reply-To: <1736001e4c00fa68e6f3b232ec59c4de@lodderstedt.net>
Date: Thu, 17 Dec 2015 15:02:47 +0100
Content-Transfer-Encoding: 7bit
Message-Id: <7F7D33B0-2245-4B21-AE0C-819E9B3BB6EB@oracle.com>
References: <20151208150508.1B4581832BB@rfc-editor.org> <1736001e4c00fa68e6f3b232ec59c4de@lodderstedt.net>
To: torsten@lodderstedt.net
X-Source-IP: aserv0022.oracle.com [141.146.126.234]
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/VbkJoOGd4HkJ6T_b03Xg-E07WaQ>
Cc: david.gladstone@nib.co.nz, iesg@ietf.org, Kathleen.Moriarty@emc.com, oauth@ietf.org, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [OAUTH-WG] [Errata Held for Document Update] RFC6819 (4267)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Dec 2015 14:03:24 -0000

+1

Phil

> On Dec 17, 2015, at 15:00, torsten@lodderstedt.net wrote:
> 
> Hi all,
> 
> the report is correct. Please consider it an errata to RFC 6819.
> 
> kind regards,
> Torsten.
> 
> Am 08.12.2015 16:05, schrieb RFC Errata System:
>> The following errata report has been held for document update
>> for RFC6819, "OAuth 2.0 Threat Model and Security Considerations".
>> --------------------------------------
>> You may review the report below and at:
>> http://www.rfc-editor.org/errata_search.php?rfc=6819&eid=4267
>> --------------------------------------
>> Status: Held for Document Update
>> Type: Editorial
>> Reported by: David Gladstone <david.gladstone@nib.co.nz>
>> Date Reported: 2015-02-09
>> Held by: Kathleen Moriarty (IESG)
>> Section: 4.4.1.11
>> Original Text
>> -------------
>> If an authorization server includes a nontrivial amount of entropy
>> Corrected Text
>> --------------
>> If an authorization server includes a trivial amount of entropy
>> Notes
>> -----
>> The threat being described outlines a scenario where too little
>> entropy is involved; countermeasures include using non-trivial amounts
>> of entropy.
>> --------------------------------------
>> RFC6819 (draft-ietf-oauth-v2-threatmodel-08)
>> --------------------------------------
>> Title               : OAuth 2.0 Threat Model and Security Considerations
>> Publication Date    : January 2013
>> Author(s)           : T. Lodderstedt, Ed., M. McGloin, P. Hunt
>> Category            : INFORMATIONAL
>> Source              : Web Authorization Protocol
>> Area                : Security
>> Stream              : IETF
>> Verifying Party     : IESG