Re: [OAUTH-WG] JSON Web Token Best Current Practices draft describing Explicit Typing
Dick Hardt <dick.hardt@gmail.com> Wed, 19 July 2017 10:53 UTC
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D873C131CA3 for <oauth@ietfa.amsl.com>; Wed, 19 Jul 2017 03:53:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0kT682owmv63 for <oauth@ietfa.amsl.com>; Wed, 19 Jul 2017 03:53:06 -0700 (PDT)
Received: from mail-qt0-x22e.google.com (mail-qt0-x22e.google.com [IPv6:2607:f8b0:400d:c0d::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E8C3131A78 for <oauth@ietf.org>; Wed, 19 Jul 2017 03:53:06 -0700 (PDT)
Received: by mail-qt0-x22e.google.com with SMTP id b40so38020476qtb.2 for <oauth@ietf.org>; Wed, 19 Jul 2017 03:53:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=yApXFyfb7+klhw+za2a2/f1W2aKxGL55OJxBYFYvxjo=; b=ntDOPQzD2Fn6vlsz2bqmwz+Hr3Ymk/g6ew36dxbPWbL+/ErWu+Z3Iii7sfQuQCRUyb sjEJsXMbrG3Izk3SZ58BdlVMMzovA9H/iW4KmYAfBo/zPgysbvmn1/7K7avYgkQGrAn3 92f6SAwyFvolzwFqdt9DvkLi1uFLLOYtmbc0/QMvJfNGAXvofOvfNGGSxtPHaS8ZymAy mJ71rvTCaUSUTd1XM/7BLkonOsYRQujpYYzTtH0ETfjLzT0h6yezRuVd1JB+6iUwhThj BaddUkvCPLdugsAxQ56yNUoDG5q0vAqX7mU5f9SL7Iz3LsnPxM+W8SOl//qgtKaxvUK+ Ch5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=yApXFyfb7+klhw+za2a2/f1W2aKxGL55OJxBYFYvxjo=; b=UUcwH+3J57dskasvDbWFZUYsYgw4KHonyAw3MkvHuzkD3UwDg2Gf3wV9OcTnu6/Q8M X8i8aV5SeGpHZ4sHmzGcnTfL/Ophhw9kjIv6xVuYmbri/d6vDh/IGvuCbOW6ZtkKb1cZ Z5fFQ19DMsfZCVPB+55Sn48PUxLs7Q0URUoeNCMi2pDZHDrALVmI/vDFJYNdXMGE6GhL 6hs4LwbPVltm+fmKn8Cocgo0Yi59ztWjqf9K3MGEeFtSsMmS/uKC/gcICt47PmGzYlLg 24XWI0Zo0k6ygtFq5YQJkeLuB6h4oFw+zEsIgyTFof4cw5oVmHK9edlnGgDIRUS0tbwF mybA==
X-Gm-Message-State: AIVw111eUN6bzxNFVAtdXBFzXq+to8J63q5RPTFiGmAyz1O7EzAj/its TUJsHvMWMKRmpVnszXxl724ecuBUIA==
X-Received: by 10.55.128.1 with SMTP id b1mr2272127qkd.76.1500461585646; Wed, 19 Jul 2017 03:53:05 -0700 (PDT)
MIME-Version: 1.0
References: <CY4PR21MB0504A6F0739B0F3EFA46AE54F5D70@CY4PR21MB0504.namprd21.prod.outlook.com> <E7958AF9-8D2A-4D30-A058-3EDE872F36AD@mit.edu>
In-Reply-To: <E7958AF9-8D2A-4D30-A058-3EDE872F36AD@mit.edu>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Wed, 19 Jul 2017 10:52:55 +0000
Message-ID: <CAD9ie-u=2uBWTMnZuNVhsfxbjnfNBb5pSrwKnTkujGWQsCJAig@mail.gmail.com>
To: Justin Richer <jricher@mit.edu>, Mike Jones <Michael.Jones@microsoft.com>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="94eb2c05ff5acfcfc70554a96f29"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_E_gNLd0eBxrR2OoW6VzqrPZdis>
Subject: Re: [OAUTH-WG] JSON Web Token Best Current Practices draft describing Explicit Typing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 10:53:09 -0000
Thanks for the feedback Justin. Do you have any specific wording? On Tue, Jul 18, 2017 at 6:34 PM Justin Richer <jricher@mit.edu> wrote: > Mike et al, > > Overall, this document has some really great advice for people who have > chosen to use JWT in various situations. It’s a needed draft and I’d like > to see it go forward. I have some suggestions on how it can be improved. > > In this draft, I’d like to see some more discussion about privacy and > security issues around choosing JWTs to begin with. Namely, putting things > like subject identifiers and scope/permission information into the JWT > structure could potentially leak information about the end user to the > client, if the JWT isn’t encrypted, and to multiple RS’s, if the JWT is > encrypted with a shared key. It basically amounts to “anyone who can read > the JWT can see what’s in it”, which on the one hand is obvious, but on the > other hand it’s not always considered by implementers. Since the audience > of an access token JWT is the RS and not the client, and the token is > opaque to the client, it’s easy to assume that the client *won’t* read the > token. However, that doesn’t mean that it *can’t* read the token. It’s a > tradeoff in design space with other solutions. > > I’d also like to see a discussion on expiration and revocation of > self-contained JWT access tokens. Again, this is targeting the decision > space of whether or not a self-contained token is an appropriate solution > in the first place. If I’m issuing JWTs that are completely self-contained, > I can’t revoke them once they’re on the wire. Yes, that’s an acceptable > risk to many and that’s fine — but I would like this document to encourage > that thought and discussion. > > Thanks, > — Justin > > On Jul 4, 2017, at 3:43 PM, Mike Jones <Michael.Jones@microsoft.com> > wrote: > > The JWT BCP draft has been updated to describe the use of explicit typing > of JWTs as one of the ways to prevent confusion among different kinds of > JWTs. This is accomplished by including an explicit type for the JWT in > the “typ” header parameter. For instance, the Security Event Token (SET) > specification <http://self-issued.info/?p=1709> now uses the “ > application/secevent+jwt” content type to explicitly type SETs. > > The specification is available at: > > - https://tools.ietf.org/html/draft-sheffer-oauth-jwt-bcp-01 > > > An HTML-formatted version is also available at: > > - http://self-issued.info/docs/draft-sheffer-oauth-jwt-bcp-01.html > > > -- Mike > > P.S. This notice was also posted at http://self-issued.info/?p=1714 and > as @selfissued <https://twitter.com/selfissued>. > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > > > _______________________________________________ > OAuth mailing list > OAuth@ietf.org > https://www.ietf.org/mailman/listinfo/oauth > -- Subscribe to the HARDTWARE <http://hardtware.com/> mail list to learn about projects I am working on!
- [OAUTH-WG] JSON Web Token Best Current Practices … Mike Jones
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Phil Hunt (IDM)
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Brian Campbell
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Mike Jones
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Justin Richer
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Dick Hardt
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Brian Campbell
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Mike Jones
- Re: [OAUTH-WG] JSON Web Token Best Current Practi… Brian Campbell