Re: [OAUTH-WG] JSON Web Token Best Current Practices draft describing Explicit Typing

Dick Hardt <dick.hardt@gmail.com> Wed, 19 July 2017 10:53 UTC

Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D873C131CA3 for <oauth@ietfa.amsl.com>; Wed, 19 Jul 2017 03:53:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0kT682owmv63 for <oauth@ietfa.amsl.com>; Wed, 19 Jul 2017 03:53:06 -0700 (PDT)
Received: from mail-qt0-x22e.google.com (mail-qt0-x22e.google.com [IPv6:2607:f8b0:400d:c0d::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E8C3131A78 for <oauth@ietf.org>; Wed, 19 Jul 2017 03:53:06 -0700 (PDT)
Received: by mail-qt0-x22e.google.com with SMTP id b40so38020476qtb.2 for <oauth@ietf.org>; Wed, 19 Jul 2017 03:53:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=yApXFyfb7+klhw+za2a2/f1W2aKxGL55OJxBYFYvxjo=; b=ntDOPQzD2Fn6vlsz2bqmwz+Hr3Ymk/g6ew36dxbPWbL+/ErWu+Z3Iii7sfQuQCRUyb sjEJsXMbrG3Izk3SZ58BdlVMMzovA9H/iW4KmYAfBo/zPgysbvmn1/7K7avYgkQGrAn3 92f6SAwyFvolzwFqdt9DvkLi1uFLLOYtmbc0/QMvJfNGAXvofOvfNGGSxtPHaS8ZymAy mJ71rvTCaUSUTd1XM/7BLkonOsYRQujpYYzTtH0ETfjLzT0h6yezRuVd1JB+6iUwhThj BaddUkvCPLdugsAxQ56yNUoDG5q0vAqX7mU5f9SL7Iz3LsnPxM+W8SOl//qgtKaxvUK+ Ch5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=yApXFyfb7+klhw+za2a2/f1W2aKxGL55OJxBYFYvxjo=; b=UUcwH+3J57dskasvDbWFZUYsYgw4KHonyAw3MkvHuzkD3UwDg2Gf3wV9OcTnu6/Q8M X8i8aV5SeGpHZ4sHmzGcnTfL/Ophhw9kjIv6xVuYmbri/d6vDh/IGvuCbOW6ZtkKb1cZ Z5fFQ19DMsfZCVPB+55Sn48PUxLs7Q0URUoeNCMi2pDZHDrALVmI/vDFJYNdXMGE6GhL 6hs4LwbPVltm+fmKn8Cocgo0Yi59ztWjqf9K3MGEeFtSsMmS/uKC/gcICt47PmGzYlLg 24XWI0Zo0k6ygtFq5YQJkeLuB6h4oFw+zEsIgyTFof4cw5oVmHK9edlnGgDIRUS0tbwF mybA==
X-Gm-Message-State: AIVw111eUN6bzxNFVAtdXBFzXq+to8J63q5RPTFiGmAyz1O7EzAj/its TUJsHvMWMKRmpVnszXxl724ecuBUIA==
X-Received: by 10.55.128.1 with SMTP id b1mr2272127qkd.76.1500461585646; Wed, 19 Jul 2017 03:53:05 -0700 (PDT)
MIME-Version: 1.0
References: <CY4PR21MB0504A6F0739B0F3EFA46AE54F5D70@CY4PR21MB0504.namprd21.prod.outlook.com> <E7958AF9-8D2A-4D30-A058-3EDE872F36AD@mit.edu>
In-Reply-To: <E7958AF9-8D2A-4D30-A058-3EDE872F36AD@mit.edu>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Wed, 19 Jul 2017 10:52:55 +0000
Message-ID: <CAD9ie-u=2uBWTMnZuNVhsfxbjnfNBb5pSrwKnTkujGWQsCJAig@mail.gmail.com>
To: Justin Richer <jricher@mit.edu>, Mike Jones <Michael.Jones@microsoft.com>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c05ff5acfcfc70554a96f29"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_E_gNLd0eBxrR2OoW6VzqrPZdis>
Subject: Re: [OAUTH-WG] JSON Web Token Best Current Practices draft describing Explicit Typing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 10:53:09 -0000

Thanks for the feedback Justin. Do you have any specific wording?

On Tue, Jul 18, 2017 at 6:34 PM Justin Richer <jricher@mit.edu> wrote:

> Mike et al,
>
> Overall, this document has some really great advice for people who have
> chosen to use JWT in various situations. It’s a needed draft and I’d like
> to see it go forward. I have some suggestions on how it can be improved.
>
> In this draft, I’d like to see some more discussion about privacy and
> security issues around choosing JWTs to begin with. Namely, putting things
> like subject identifiers and scope/permission information into the JWT
> structure could potentially leak information about the end user to the
> client, if the JWT isn’t encrypted, and to multiple RS’s, if the JWT is
> encrypted with a shared key. It basically amounts to “anyone who can read
> the JWT can see what’s in it”, which on the one hand is obvious, but on the
> other hand it’s not always considered by implementers. Since the audience
> of an access token JWT is the RS and not the client, and the token is
> opaque to the client, it’s easy to assume that the client *won’t* read the
> token. However, that doesn’t mean that it *can’t* read the token. It’s a
> tradeoff in design space with other solutions.
>
> I’d also like to see a discussion on expiration and revocation of
> self-contained JWT access tokens. Again, this is targeting the decision
> space of whether or not a self-contained token is an appropriate solution
> in the first place. If I’m issuing JWTs that are completely self-contained,
> I can’t revoke them once they’re on the wire. Yes, that’s an acceptable
> risk to many and that’s fine — but I would like this document to encourage
> that thought and discussion.
>
> Thanks,
>  — Justin
>
> On Jul 4, 2017, at 3:43 PM, Mike Jones <Michael.Jones@microsoft.com>
> wrote:
>
> The JWT BCP draft has been updated to describe the use of explicit typing
> of JWTs as one of the ways to prevent confusion among different kinds of
> JWTs.  This is accomplished by including an explicit type for the JWT in
> the “typ” header parameter.  For instance, the Security Event Token (SET)
> specification <http://self-issued.info/?p=1709> now uses the “
> application/secevent+jwt” content type to explicitly type SETs.
>
> The specification is available at:
>
>    - https://tools.ietf.org/html/draft-sheffer-oauth-jwt-bcp-01
>
>
> An HTML-formatted version is also available at:
>
>    - http://self-issued.info/docs/draft-sheffer-oauth-jwt-bcp-01.html
>
>
>                                                        -- Mike
>
> P.S.  This notice was also posted at http://self-issued.info/?p=1714 and
> as @selfissued <https://twitter.com/selfissued>.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
-- 
Subscribe to the HARDTWARE <http://hardtware.com/> mail list to learn about
projects I am working on!