Re: [OAUTH-WG] PAR error for redirect URI?
Vladimir Dzhuvinov <vladimir@connect2id.com> Fri, 04 December 2020 07:29 UTC
Return-Path: <vladimir@connect2id.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C9C93A13F3 for <oauth@ietfa.amsl.com>; Thu, 3 Dec 2020 23:29:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TL67BdSDt-kJ for <oauth@ietfa.amsl.com>; Thu, 3 Dec 2020 23:29:48 -0800 (PST)
Received: from p3plsmtpa12-07.prod.phx3.secureserver.net (p3plsmtpa12-07.prod.phx3.secureserver.net [68.178.252.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2ECD43A13F2 for <oauth@ietf.org>; Thu, 3 Dec 2020 23:29:48 -0800 (PST)
Received: from [192.168.88.250] ([94.155.17.31]) by :SMTPAUTH: with ESMTPSA id l5XGkPvDQJwSFl5XGkimuG; Fri, 04 Dec 2020 00:29:47 -0700
x-spam-cmae: v=2.4 cv=dcRFYVbe c=1 sm=1 tr=0 ts=5fc9e56b p=_Y5QVBCcAAAA:8 a=+I3yL00+yDwT8KNLgfs+4A==:117 a=+I3yL00+yDwT8KNLgfs+4A==:17 a=q0rX5H01Qin5IyBaTmIA:9 a=r77TgQKjGQsHNAKrUKIA:9 a=pGLkceISAAAA:8 a=48vgC7mUAAAA:8 a=1XWaLZrsAAAA:8 a=bni3dQmXGEzwKo8-QP0A:9 a=QEXdDO2ut3YA:10 a=IW_zQs2oMLEA:10 a=YWXEy_97qxwA:10 a=1xOB4YiTHOsA:10 a=hhRRb06fAAAA:8 a=EnT5GZYCVyqKcKa3HN4A:9 a=4MmiVwRYZYX5uFfh:21 a=_W_S_7VecoQA:10 a=D8lnhvtxf0AONpHuB7QA:9 a=ZVk8-NSrHBgA:10 a=30ssDGKg3p0A:10 a=IdGyktwZ2tr74praB_5u:22 a=w1C3t2QeGrPiZgrLijVG:22 a=n3QqoSL0uoLsV-jlCK0K:22
x-spam-account: vladimir@connect2id.com
x-spam-domain: connect2id.com
X-CMAE-Analysis: v=2.4 cv=dcRFYVbe c=1 sm=1 tr=0 ts=5fc9e56b p=_Y5QVBCcAAAA:8 a=+I3yL00+yDwT8KNLgfs+4A==:117 a=+I3yL00+yDwT8KNLgfs+4A==:17 a=q0rX5H01Qin5IyBaTmIA:9 a=r77TgQKjGQsHNAKrUKIA:9 a=pGLkceISAAAA:8 a=48vgC7mUAAAA:8 a=1XWaLZrsAAAA:8 a=bni3dQmXGEzwKo8-QP0A:9 a=QEXdDO2ut3YA:10 a=IW_zQs2oMLEA:10 a=YWXEy_97qxwA:10 a=1xOB4YiTHOsA:10 a=hhRRb06fAAAA:8 a=EnT5GZYCVyqKcKa3HN4A:9 a=4MmiVwRYZYX5uFfh:21 a=_W_S_7VecoQA:10 a=D8lnhvtxf0AONpHuB7QA:9 a=ZVk8-NSrHBgA:10 a=30ssDGKg3p0A:10 a=IdGyktwZ2tr74praB_5u:22 a=w1C3t2QeGrPiZgrLijVG:22 a=n3QqoSL0uoLsV-jlCK0K:22
X-SECURESERVER-ACCT: vladimir@connect2id.com
To: oauth@ietf.org
References: <CA+k3eCQitAWnHaw2zz0jwyjHxWPYe0VPct1Op1T13BVhydkXDQ@mail.gmail.com> <CALAqi__ncGQgbunhunmaCrtUsAe-v+HnLWZM2Ca5VWarUr2Y=w@mail.gmail.com> <CDA006E7-8D4F-49AF-9C68-3BCEEFCFA687@lodderstedt.net> <CALAqi_9ewvmUUJNzXMU2JUU9eSVwwjGQMe7mCva=WFrA1JME9g@mail.gmail.com> <CADNypP9VniF0SBDSo+ZvwX7kYcmn_H6Vv2LvRZiwZwADG1Foxw@mail.gmail.com>
From: Vladimir Dzhuvinov <vladimir@connect2id.com>
Autocrypt: addr=vladimir@connect2id.com; prefer-encrypt=mutual; keydata= mQENBFQZaoEBCACnP2YMDex9fnf+niLglTHGKuoypUSVKPQeKDHHeFQVzhRke+HBEZBwmA9T kZ+kEhyrNqibDPkPYVPmo23tM8mbNcTVQqpmN7NwgMpqkqcAqNsIyBtt09DjWOQVm57A3K+y uXI7SdNErdt79p2xQseOhqSC9+LgWuyh+mZsl2oFD4glFFfKSCMp2jATXrAMeGzigTnW+Xe0 tRzrwFN9zqykKxhUq9oHg1cNvoDtfxgsc9ysVHbxM/PM8o9lgj3YTQwKMBcCFclTqohji7ML fQ08eQo+acKTwC1WRzeLt9PknGt3C4TmvdCl0c1BQTTTNiF96Hu4kbaiBIbsfxJOR8+VABEB AAG0LFZsYWRpbWlyIER6aHV2aW5vdiA8dmxhZGltaXJAY29ubmVjdDJpZC5jb20+iQE+BBMB AgAoBQJUGWqBAhsjBQkJZgGABgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRAZ0vUyOqri Ql62B/wOO0s2JC/QvO6w9iSsRhCOa/JZi+wO+l01V7eGCQ1cYf1W26Y7iKiUlY4/Kz+cr69D pMtkv3UpDTGejKEfspLUxz5Vo3T4oAKbTtNtVIZL/XxH3/JhJ719Jj4eLoe9/djKkGYTX2O5 bMk8TpO1DDjbIw4r9XKI9ZIk96zlKnZvrg7Ho7oOl0ZIf8AzcvdqZEUogDwyr8uwOU+jIyux mOTthepBzXCNjjBjnc8I1//9YppAIaGJ5nnXelVVD1/dyOszogervzFNANEIOvNvCd9G5u4e s7qkDKWKY7/Lj1tF+tMrDTrOh6JqUKbGNeTUB8DlPvIoNyqHUYfBELdpw1Nd
Organization: Connect2id Ltd.
Message-ID: <9a58bd66-e259-ebb9-1ed5-3f5075f44d97@connect2id.com>
Date: Fri, 04 Dec 2020 09:29:45 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0
MIME-Version: 1.0
In-Reply-To: <CADNypP9VniF0SBDSo+ZvwX7kYcmn_H6Vv2LvRZiwZwADG1Foxw@mail.gmail.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms030700080203090701030804"
X-CMAE-Envelope: MS4xfCo78uyv45NhGzGurYiaD1490fyuGaGzAcvUglYnw9h8Hie0e1hMOysLrqSv0zn0YOzRXbzO0TGLk7k8D+EAidGUI5g3Dh52zGEx7VJLAfjoFY8CfLNc GfI9wxys6ImMNHn5cbIutZ/+KHbn4Lg6DDi+dDA+o7h/ldissV8Uqn0d2xyn1spOQxygQp00+mtfhQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_jnJy4p3kacHYtjHS1YbvZ61o1E>
Subject: Re: [OAUTH-WG] PAR error for redirect URI?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Dec 2020 07:29:50 -0000
If people have articulated a need to have an invalid_redirect_uri error for the PAR endpoint, then let's register it properly. Rifaat says there's still time to do this. I'm also okay with using the general invalid_request code for this. In this case a sentence, next to the current example, spelling out what the PAR endpoint must do on a invalid redirect URI will help. Vladimir On 03/12/2020 13:49, Rifaat Shekh-Yusef wrote: > Torsten, Filip, > > You can absolutely make this change, as we are still very early in the > process. > So feel free to continue this effort and try to get WG agreement on > this, and update the document as needed. > > Regards, > Rifaat > > > On Thursday, December 3, 2020, Filip Skokan <panva.ip@gmail.com > <mailto:panva.ip@gmail.com>> wrote: > > To be clear, I'm not advocating to skip the registration, just > wanted to mention a potential concern. If the process allows it > and it will not introduce more delay to publication, I think we > should go ahead and register the error code. > > Best, > *Filip* > > > On Thu, 3 Dec 2020 at 11:06, Torsten Lodderstedt > <torsten@lodderstedt.net <mailto:torsten@lodderstedt.net>> wrote: > > > > > Am 03.12.2020 um 09:56 schrieb Filip Skokan > <panva.ip@gmail.com <mailto:panva.ip@gmail.com>>: > > > > There are several documents already mentioning > "invalid_redirect_uri" as an error code, specifically RFC7519 > and OpenID Connect Dynamic Client Registration 1.0. But these > don't register it in the IANA OAuth Extensions Error Registry, > presumably because they're neither for the authorization or > token endpoints. > > > > While I think it'd be great if we had this error code > registered, I also worry that its registration could confuse > implementers to think it's okay to return it from the > authorization endpoint. > > I understand your concern. On the other hand, registering the > error code is in my opinion the proper way forward. The > registration is scoped to a usage location, should be pushed > authorization endpoint then, and RFC6749 gives clear guidance > on how to treat errors related to the redirect URI at the > authorization endpoint. > > "If the request fails due to a missing, invalid, or mismatching > redirection URI, … authorization server ... MUST NOT > automatically redirect the user-agent to the > invalid redirection URI." > > I think if an implementor ignores this, it will ignore any advise. > > best regards, > Torsten. > > > > > Best, > > Filip > > > > > > On Thu, 3 Dec 2020 at 00:29, Brian Campbell > <bcampbell=40pingidentity.com@dmarc.ietf.org > <mailto:40pingidentity.com@dmarc.ietf.org>> wrote: > > During the course of a recent OIDF FAPI WG discussion (the > FAPI profiles use PAR for authz requests) on this issue it was > noted that there's no specific error code for problems with > the redirect_uri (the example in > https://www.ietf.org/archive/id/draft-ietf-oauth-par-04.html#section-2.3 > <https://www.ietf.org/archive/id/draft-ietf-oauth-par-04.html#section-2.3> > even shows a general error code with mention of the > redirect_uri not being valid in the error description). Some > folks on that call thought it would be worthwhile to have a > more specific error code for an invalid redirect_uri and I > reluctantly took an action item to raise the issue here. At > the time I'd forgotten that PAR had already passed WGLC. But > it's been sitting idle while awaiting the shepherd writeup > since mid September so it's maybe realistic to think the > window for a small change is still open. > > > > Presumably nothing like an "invalid_redirect_uri" error code > was defined in RFC 6749 because that class of errors could not > be returned to the client via redirection. But the data flow > in PAR would allow for a "invalid_redirect_uri" so it's not an > unreasonable thing to do. > > > > As I write this message, however, I'm not personally > convinced that it's worth making a change to PAR at this > point. But I did say I'd bring the question up in the WG list > and I'm just trying to be true to my word. So here it is. > Please weigh in, if you have opinions on the matter. > > > > > > > > CONFIDENTIALITY NOTICE: This email may contain confidential > and privileged material for the sole use of the intended > recipient(s). Any review, use, distribution or disclosure by > others is strictly prohibited. If you have received this > communication in error, please notify the sender immediately > by e-mail and delete the message and any file attachments from > your computer. Thank > you._______________________________________________ > > OAuth mailing list > > OAuth@ietf.org <mailto:OAuth@ietf.org> > > https://www.ietf.org/mailman/listinfo/oauth > <https://www.ietf.org/mailman/listinfo/oauth> > > _______________________________________________ > > OAuth mailing list > > OAuth@ietf.org <mailto:OAuth@ietf.org> > > > https://www.google.com/url?q=https://www.ietf.org/mailman/listinfo/oauth&source=gmail-imap&ust=1607590629000000&usg=AOvVaw3aW1gdv4EEiLmNYzlsJj-A > <https://www.google.com/url?q=https://www.ietf.org/mailman/listinfo/oauth&source=gmail-imap&ust=1607590629000000&usg=AOvVaw3aW1gdv4EEiLmNYzlsJj-A> > >
- [OAUTH-WG] PAR error for redirect URI? Brian Campbell
- Re: [OAUTH-WG] PAR error for redirect URI? Filip Skokan
- Re: [OAUTH-WG] PAR error for redirect URI? Torsten Lodderstedt
- Re: [OAUTH-WG] PAR error for redirect URI? Filip Skokan
- [OAUTH-WG] PAR error for redirect URI? Rifaat Shekh-Yusef
- Re: [OAUTH-WG] PAR error for redirect URI? Vladimir Dzhuvinov
- Re: [OAUTH-WG] PAR error for redirect URI? Neil Madden
- Re: [OAUTH-WG] PAR error for redirect URI? Brian Campbell
- Re: [OAUTH-WG] PAR error for redirect URI? Brian Campbell
- Re: [OAUTH-WG] PAR error for redirect URI? Vladimir Dzhuvinov
- Re: [OAUTH-WG] PAR error for redirect URI? Brian Campbell
- Re: [OAUTH-WG] PAR error for redirect URI? Dave Tonge
- Re: [OAUTH-WG] PAR error for redirect URI? Brian Campbell
- Re: [OAUTH-WG] PAR error for redirect URI? Torsten Lodderstedt
- Re: [OAUTH-WG] PAR error for redirect URI? Brian Campbell
- Re: [OAUTH-WG] PAR error for redirect URI? Torsten Lodderstedt