Re: [OAUTH-WG] Device Flow: Alternative to Polling

Torsten Lodderstedt <torsten@lodderstedt.net> Sun, 13 November 2016 06:15 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E38A21295C0 for <oauth@ietfa.amsl.com>; Sat, 12 Nov 2016 22:15:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level:
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uUuOPV8gWDgr for <oauth@ietfa.amsl.com>; Sat, 12 Nov 2016 22:15:48 -0800 (PST)
Received: from smtprelay04.ispgateway.de (smtprelay04.ispgateway.de [80.67.31.38]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D68C51294B4 for <oauth@ietf.org>; Sat, 12 Nov 2016 22:15:46 -0800 (PST)
Received: from [58.120.104.2] (helo=[192.168.101.185]) by smtprelay04.ispgateway.de with esmtpsa (TLSv1.2:DHE-RSA-AES128-SHA:128) (Exim 4.84) (envelope-from <torsten@lodderstedt.net>) id 1c5o4t-0004PC-07; Sun, 13 Nov 2016 07:15:44 +0100
To: Simon Moffatt <simon.moffatt@forgerock.com>, William Denniss <wdenniss@google.com>, Aaron Parecki <aaron@parecki.com>
References: <8b540eff-2b1c-2d9f-6d40-2be327f91eb7@gmx.net> <CAGBSGjoO3LiA4NZ9tKrK1KHzBY2MkbfG+XNu_1tnFAptjSnZzQ@mail.gmail.com> <CAAP42hC9SubNrhYeoxPUx2faW_G59yQT0Aqm1U5wRVCcb5Qxfw@mail.gmail.com> <ac510d94-424c-0ca7-3e4d-b33629124b08@forgerock.com>
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-ID: <58280507.2000700@lodderstedt.net>
Date: Sun, 13 Nov 2016 15:15:35 +0900
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.0
MIME-Version: 1.0
In-Reply-To: <ac510d94-424c-0ca7-3e4d-b33629124b08@forgerock.com>
Content-Type: multipart/alternative; boundary="------------010406020009000301040507"
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC5uZXQ=
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/YQdAvlW9yK8hHhEPlwN5kl_IWaQ>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Device Flow: Alternative to Polling
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 13 Nov 2016 06:15:51 -0000

It would be great to learn more about implementation experiences and 
have implementation considerations in this spec.

In the OpenID MODRNA working group, we are working on specs facing 
similar challenges and decided to offer both pull and push style 
communication (e.g. 
https://xml2rfc.tools.ietf.org/cgi-bin/xml2rfc.cgi?Submit=Submit&format=ascii&mode=html&type=ascii&url=https://bitbucket.org/openid/mobile/raw/tip/draft-user-questioning-api.xml). 
If your experience suggests pull is totally sufficient and easier to 
implement (esp. for the client), we could also simplify our stuff.

best regards,
Torsten.

Am 24.10.2016 um 17:30 schrieb Simon Moffatt:
>
> I agree, simplicity is key here.
>
> From a practicality perspective (ForgeRock implemented the AS part of 
> the device flow in January), there were some steps to mitigate things 
> like potential excessive polling and DoS but they can be easily 
> overcome on the AS side of things), but as William says, polling is 
> simple and solves the use case.
>
> The option of running an HTTP stack on the device, is maybe overkill 
> for some deployments though, especially with lower powered devices and 
> the management overhead.
>
> Websocket style notifications are gaining popularity for other web 
> access management use cases like session destruction notifications and 
> session attribute changes so that seems a viable option.
>
>
> On 21/10/16 23:50, William Denniss wrote:
>> We've been operating with polling for a while and handle a decent 
>> amount of traffic (the YouTube TV app uses it), the polling gets the 
>> job done. The simplicity of the protocol definitely helps when used 
>> on constrained devices.
>>
>> I like the idea of adding HTTP/2 based long-poll as an optional 
>> enhancement, especially if we can define it in ways that don't alter 
>> the underlying protocol a whole lot.
>>
>> On Fri, Oct 21, 2016 at 3:35 PM, Aaron Parecki <aaron@parecki.com 
>> <mailto:aaron@parecki.com>> wrote:
>>
>>     Part of the beauty of the current device flow spec is that it's
>>     so simple to support. Keeping that simplicity is crucial
>>     especially for this, since this flow is used by a variety of
>>     devices that often do not have higher level stacks.
>>
>>     I would love to hear from someone who has experience with
>>     large-scale deployments of this to know whether polling is even a
>>     problem in the first place.
>>
>>     ----
>>     Aaron Parecki
>>     aaronparecki.com <http://aaronparecki.com/>
>>     @aaronpk <http://twitter.com/aaronpk>
>>
>>     ----
>>     Aaron Parecki
>>     aaronparecki.com <http://aaronparecki.com>
>>     @aaronpk <http://twitter.com/aaronpk>
>>
>>
>>     On Fri, Oct 21, 2016 at 3:23 PM, Hannes Tschofenig
>>     <hannes.tschofenig@gmx.net <mailto:hannes.tschofenig@gmx.net>> wrote:
>>
>>         Hi all,
>>
>>         the device flow document outlines the case when an OAuth
>>         interaction
>>         gets "outsourced" to a separate device in order to allow user
>>         authentication and collecting the consent.
>>
>>         The exchange is described in Section 1 of
>>         https://tools.ietf.org/html/draft-ietf-oauth-device-flow-03
>>         <https://tools.ietf.org/html/draft-ietf-oauth-device-flow-03>.
>>
>>         Here is the step that was raised during the discussions:
>>
>>               (E) While the end-user authorizes (or denies) the
>>         client's request
>>               (D), the client repeatedly polls the authorization
>>         server to find
>>               out if the end-user completed the end-user
>>         authorization step.
>>               The client includes the verification code and its client
>>               identifier.
>>
>>         The question was whether we could come up with an alternative
>>         to polling
>>         since this step could potentially take some time. Hence, it
>>         would be
>>         better if the authorization server has a way to send a
>>         message to the
>>         client without polling. Of course, the polling frequency
>>         matters and how
>>         quickly one (e.g., user) wants to know about the successful
>>         authorization.
>>
>>         So, the first question is whether polling is considered as a
>>         problem in
>>         the first place.
>>
>>         If so, then the question is how this could be addressed and
>>         (from work
>>         in other areas) there are really only two approaches:
>>
>>         1) We make use of some protocol that keeps the connection
>>         open and allow
>>         asynchronous communication. HTTP/2 and Websockets come to mind.
>>
>>         2) The client can be addressed through some push notification
>>         mechanism,
>>         such as by running an HTTP server on the device that can then
>>         be used by
>>         the authorization server.
>>
>>         Any views about this topic?
>>
>>         Ciao
>>         Hannes
>>
>>
>>
>>         _______________________________________________
>>         OAuth mailing list
>>         OAuth@ietf.org <mailto:OAuth@ietf.org>
>>         https://www.ietf.org/mailman/listinfo/oauth
>>         <https://www.ietf.org/mailman/listinfo/oauth>
>>
>>
>>
>>     _______________________________________________
>>     OAuth mailing list
>>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>>     https://www.ietf.org/mailman/listinfo/oauth
>>     <https://www.ietf.org/mailman/listinfo/oauth>
>>
>>
>>
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
> -- 
> ForgeRock <http://www.forgerock.com/> 	*Simon Moffatt*
> OpenAM - Technical Product Manager  |  ForgeRock
> *tel* +44 (0) 7903 347 240  | *e* Simon.Moffatt@Forgerock.com 
> <mailto:simon.moffatt@forgerock.com>
> *skype* simon.moffatt  | *web* www.forgerock.com 
> <http://www.forgerock.com/>  | *twitter* @simonmoffatt
>
>
>
> Summits <https://summits.forgerock.com/>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth