Re: [OAUTH-WG] PoP Key Distribution

Ludwig Seitz <ludwig.seitz@ri.se> Wed, 04 July 2018 06:37 UTC

Return-Path: <ludwig.seitz@ri.se>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B82E130EB4 for <oauth@ietfa.amsl.com>; Tue, 3 Jul 2018 23:37:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id smBhYxUJrOpm for <oauth@ietfa.amsl.com>; Tue, 3 Jul 2018 23:37:17 -0700 (PDT)
Received: from smtp-out11.electric.net (smtp-out11.electric.net [185.38.181.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A10EB130DD7 for <oauth@ietf.org>; Tue, 3 Jul 2018 23:37:17 -0700 (PDT)
Received: from 1fabPf-000S0l-TD by out11d.electric.net with emc1-ok (Exim 4.90_1) (envelope-from <ludwig.seitz@ri.se>) id 1fabPf-000S1w-U1 for oauth@ietf.org; Tue, 03 Jul 2018 23:37:15 -0700
Received: by emcmailer; Tue, 03 Jul 2018 23:37:15 -0700
Received: from [194.218.146.197] (helo=sp-mail-2.sp.se) by out11d.electric.net with esmtps (TLSv1.2:ECDHE-RSA-AES128-SHA256:128) (Exim 4.90_1) (envelope-from <ludwig.seitz@ri.se>) id 1fabPf-000S0l-TD for oauth@ietf.org; Tue, 03 Jul 2018 23:37:15 -0700
Received: from [192.168.0.166] (10.116.0.226) by sp-mail-2.sp.se (10.100.0.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Wed, 4 Jul 2018 08:37:14 +0200
To: oauth@ietf.org
References: <VI1PR0801MB211213D11E7820FD31218663FA420@VI1PR0801MB2112.eurprd08.prod.outlook.com> <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
From: Ludwig Seitz <ludwig.seitz@ri.se>
Message-ID: <67ab6c51-4299-b433-01f0-cd023574175a@ri.se>
Date: Wed, 04 Jul 2018 08:37:09 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
MIME-Version: 1.0
In-Reply-To: <DM5PR00MB029359EBBE81D3899BEA34FBF5420@DM5PR00MB0293.namprd00.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [10.116.0.226]
X-ClientProxiedBy: sp-mail-3.sp.se (10.100.0.163) To sp-mail-2.sp.se (10.100.0.162)
X-Outbound-IP: 194.218.146.197
X-Env-From: ludwig.seitz@ri.se
X-Proto: esmtps
X-Revdns:
X-HELO: sp-mail-2.sp.se
X-TLS: TLSv1.2:ECDHE-RSA-AES128-SHA256:128
X-Authenticated_ID:
X-PolicySMART: 14510320
X-Virus-Status: Scanned by VirusSMART (c)
X-Virus-Status: Scanned by VirusSMART (s)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Zmpr_gQwfv9h_QjDShdwkjT2HqM>
Subject: Re: [OAUTH-WG] PoP Key Distribution
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Jul 2018 06:37:21 -0000

On 2018-07-03 22:10, Mike Jones wrote:

> 
> I believe that the ACE “profile” parameter is typically unnecessary and 
> not in the spirit of normal OAuth.  Configuration information between 
> OAuth participants is typically configured out of band and/or retrieved 
> from the AS Discovery document (per the newly minted RFC 8414 
> <https://tools.ietf.org/html/rfc8414>). There’s no need to dynamically 
> exchange a profile identifier when this is essentially always known in 
> advance.  We should not include “profile”.  For that matter, ACE should 
> delete it as well, as it certainly isn’t appropriate in constrained 
> environments.
>

I strongly disagree with this statement. First of all let me correct a 
misconception you seem to have: RFC 8414 is about AS metadata, while 
"profile" is RS metadata, so unless I've overlooked something, RFC 8414 
is not applicable.
The "profile" parameter tells a client which communication security 
method to use with the RS (e.g. TLS) and how to perform the 
proof-of-possession of a token towards an RS (e.g. TLS client 
authentication).
When you take the work on proof-of-possession into account, that feels 
very much in the spirit of OAuth.

Second: the "profile" parameter is optional, so if it is already known 
because it was configured out of band or discovered somehow you just 
don't send it.

Finally: Profile is intended for use cases were mobile clients and RS 
dynamically join and leave a network, so that pre-configuring clients 
with metadata about the RS is difficult. Do you have a better idea how 
to solve these cases?


/Ludwig

-- 
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51