Re: [OAUTH-WG] Last Call comments on draft-ietf-oauth-proof-of-possession

Nat Sakimura <sakimura@gmail.com> Wed, 25 March 2015 00:47 UTC

Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAA681A1BBC for <oauth@ietfa.amsl.com>; Tue, 24 Mar 2015 17:47:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2xYVlu1TyP6J for <oauth@ietfa.amsl.com>; Tue, 24 Mar 2015 17:47:04 -0700 (PDT)
Received: from mail-oi0-x230.google.com (mail-oi0-x230.google.com [IPv6:2607:f8b0:4003:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AEA0A1A1B85 for <oauth@ietf.org>; Tue, 24 Mar 2015 17:47:04 -0700 (PDT)
Received: by oiag65 with SMTP id g65so8860905oia.2 for <oauth@ietf.org>; Tue, 24 Mar 2015 17:47:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=/317TGMDyL4Jacig8tNlupmWqwCW7ISKuRNHdZQVHjE=; b=cqAo0sNmuFiPCGC66Sxn+Wqaoa3Sccc1im4HH+r/eRv7hjO5yOMi1PPUbycZFslP40 cHRivBTpCzybrEWTnkzMEPlwsB1AAIyMy403/o8SJt0hLdugslVgoZdUZ12QHBY5ue1z vT/sao2dJRMdj4UcHqMx0ZnHyvE+23KLQG2YOwEwzEOtfu2lEY7VoBMLtRyCbTYFTCjw l1Ygi8DNST1CsNhL8Nzw5xN5bKz9qZDIPcUhEuV4MhCqJpo0RyZ3EtjEfJp6uykYcIUL 4lsmE5T5ZqmyvxhQ5FWJbWgtkqgswxYQmg1+Yw8zbzX0g3n1b8ngZvJBaqFAerSy0tzZ kHLA==
MIME-Version: 1.0
X-Received: by 10.182.24.133 with SMTP id u5mr5384776obf.27.1427244424216; Tue, 24 Mar 2015 17:47:04 -0700 (PDT)
Received: by 10.60.141.230 with HTTP; Tue, 24 Mar 2015 17:47:04 -0700 (PDT)
In-Reply-To: <6DA5408F-2E11-45AE-A190-1724958D7960@mit.edu>
References: <6DA5408F-2E11-45AE-A190-1724958D7960@mit.edu>
Date: Wed, 25 Mar 2015 09:47:04 +0900
Message-ID: <CABzCy2BwEnh__mBveDgzBfkByhHjxpwK+mEG1vHJ+bY7kqQr4w@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
To: Justin Richer <jricher@mit.edu>
Content-Type: multipart/alternative; boundary="001a11c30864e9c5fa0512123c07"
Archived-At: <http://mailarchive.ietf.org/arch/msg/oauth/cqjlMBwoMZEVpZYCvcAIhkhGyaw>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Last Call comments on draft-ietf-oauth-proof-of-possession
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 00:47:06 -0000

I tend to agree.

This document is describing the format of (subset of) what I have been
calling as Registered token in contrast to a bearer token.

It is currently covering two types of registered token:
- key embedding
- key reference embedding

There can be other types such as
- authorized presenter ID embedding

etc. as well, in which case, you would have a top level member "azp" and no
"cnf".

Perhaps a title change to something like "JWT registered token format" etc.
may be a good idea.

Cheers,

Nat


2015-03-25 8:31 GMT+09:00 Justin Richer <jricher@mit.edu>:

> I believe that this draft is misnamed and therefore somewhat misleading:
> it’s fundamentally a method of protected key transmission using JWT, and
> not about proof of possession of that key. The proof is in simply using the
> key to create a JWT within an application (such as will be in
> draft-ietf-oauth-signed-http-request). Proof of possession of a key does
> not require the transmission of the key or a direct reference through the
> client via a data structure, and I don’t want to accidentally give the
> impression that one needs to use a structured token for proof of possession
> to work.
>
> For instance, in an alternative approach, the AS can issue a random-blob
> token to the client along side the key value (as it’s done in this draft),
> and the client presents the random-blob token to the RS. The RS then looks
> up the information about the random-blob, using a local lookup or
> introspection or some other magic, to get the information that it needs.
> The client doesn’t need to know anything about it, as the token itself is
> opaque to the client.
>
> That said, overall the structure and function of the draft is good for
> what it actually is. The client remains agnostic about what’s inside the
> token itself, as in regular OAuth. It gives semantic processing for an RS
> to process messages (of various types) signed by keys issued alongside
> these structured tokens.
>
> I think this problem could be fixed by renaming the draft and rewriting
> the introduction.
>
>  — Justin
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en