Re: [OAUTH-WG] JWT access tokens and the revocation endpoint

vittorio.bertocci@auth0.com Tue, 06 October 2020 21:53 UTC

Return-Path: <vittorio.bertocci@auth0.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C36DF3A1504 for <oauth@ietfa.amsl.com>; Tue, 6 Oct 2020 14:53:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auth0.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eeIDVJ3Ezfh1 for <oauth@ietfa.amsl.com>; Tue, 6 Oct 2020 14:53:33 -0700 (PDT)
Received: from mail-pj1-x1044.google.com (mail-pj1-x1044.google.com [IPv6:2607:f8b0:4864:20::1044]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA5B33A09C4 for <oauth@ietf.org>; Tue, 6 Oct 2020 14:53:33 -0700 (PDT)
Received: by mail-pj1-x1044.google.com with SMTP id j8so5056pjy.5 for <oauth@ietf.org>; Tue, 06 Oct 2020 14:53:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=auth0.com; s=google; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:thread-index:content-language; bh=7nhc7wbuPquCGCRCVtnRWdTFFArwW+nvC2BqFuqEvXY=; b=qw7/nDz6q8lW+UxKu54o8CWMNrJVYxQ5b2u87RsCnxmnKh2NMlRrklOXjTwrHhNe45 w7kB8FZdW+xNi0il6R1njF3zRh4cqyLlBKNShXQO3xcsPQ8WlcpeZvFij539QQI/jivt 3eUQ6syFyh+8obdMqVSV8sRvXoyTCUGMk18IN+ICDaLmcbuBAqXMAsrWqKDRHzPUblKA 9lgH+/gxtZxuRE1hmtHN5hHaR39dWyB2juXbaSCWv5Ure7VuqgjbLMSq9j5Ch33FOnqC 2Le5MQnZKlvDzYdzx7iBm1MgBTbLSEZIrHEaYcrE2GSTd6lkJ5/Rs2NdpTd/9WFwH+ch SGyw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:thread-index:content-language; bh=7nhc7wbuPquCGCRCVtnRWdTFFArwW+nvC2BqFuqEvXY=; b=kzh9SK5ansMOloZiKk4TzuMZ7tGsew44gEqi4LtLwgkVQ4JxVVOZl6svNZCPbP4MAO vNUPpEz/Kd6SXwsS346ZcCQM+0IULb3izX+Oe+gYjKiv8oGMCuE9LBVaUxM9RrXd+uzi s1/YMoC+lQM5cKuomPCTGhvjRv7PyLl84PSwX+JFhCiLR+/nBaLanEvh650eH8wPEPfL TjzIFx+qjAMAOJd/4HU6KlM4Wz+8kxAtvKFXIQUy8pQVmyCIASDhuxmb0GbpZR0YYLhs TWe3HerxGD7x5LN92zRmWcnniDeTjwBZTeCLh/fpswCyaTyb7tnY6gd+qdEUWKo+nKkp 5Sxw==
X-Gm-Message-State: AOAM532nhJdxlivICk7zHduF416gxg5L64n13pDW2YtUWMEurDk78Sb8 71w/r1HXD7+U8Dha/X1N8kZTsw==
X-Google-Smtp-Source: ABdhPJzmapfyxGPGiIv9lk/opA/m0mS5J1GrXcTjZVe9wxCdpXSNYeRxI60WiftJEK0aLnFs9H1RRg==
X-Received: by 2002:a17:902:714d:b029:d3:b593:297b with SMTP id u13-20020a170902714db02900d3b593297bmr112457plm.85.1602021213048; Tue, 06 Oct 2020 14:53:33 -0700 (PDT)
Received: from vibrosurface7 (c-67-171-8-60.hsd1.wa.comcast.net. [67.171.8.60]) by smtp.gmail.com with ESMTPSA id q8sm142245pfk.207.2020.10.06.14.53.31 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 06 Oct 2020 14:53:32 -0700 (PDT)
From: vittorio.bertocci@auth0.com
To: 'Andrii Deinega' <andrii.deinega@gmail.com>, oauth@ietf.org
References: <a5b45629-c770-2294-4277-73801fff1857@babelouest.org> <13035645-B875-48E5-80DC-C1FD401423E2@manicode.com> <060901d69c26$ba2deab0$2e89c010$@auth0.com> <CALkShct4=DPHygj5ECSuDo09xA4H73SDnjXycbZi3L+ktjZDVA@mail.gmail.com>
In-Reply-To: <CALkShct4=DPHygj5ECSuDo09xA4H73SDnjXycbZi3L+ktjZDVA@mail.gmail.com>
Date: Tue, 06 Oct 2020 14:53:32 -0700
Message-ID: <064801d69c2b$229141c0$67b3c540$@auth0.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0649_01D69BF0.7634B3B0"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIOrL5PoOMmS7FkPutnv0CxOSedfQJQ4VslAe3qkQ0A637UMKjxp1Dw
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/dB5F0d8htdU4E6LU760Yaz1yZIw>
Subject: Re: [OAUTH-WG] JWT access tokens and the revocation endpoint
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Oct 2020 21:53:36 -0000

Hi Andrii,

Thanks for the thoughtful comments! Here’s my 2 c.

 

On the proposed language: given that the JWT AT profile is just providing more details on the content of an AT, making JWT ATs a proper subset of all ATs, readers should have no reason to believe that introspection or any other existing spec discussing AT behavior should operate differently. That assumption holds for everything across the board, hence it would be a bit odd to call out this particular case. On the userinfo case, I would find it even more left field to say anything about it.
If we do reach a consensus on specific revocation practices that apply to JWT ATs specifically, and we conclude that they should live in this document, I will be happy to add language accordingly.

 

On the AJWT: I hear you on the dissonance that JWT AT carries, but I am very hesitant to introduce new acronyms to an already crowded/impenetrable domain.
JWT access token might not roll off the tongue, but at this point ‘JWT’ is nearly a proprietary eponym and the expression “JWT token” is extraordinarily common in literature, a quick google query will give you the full measure of the phenomenon, hence I think we’ll be OK with the current form.

Cheers,

V.

 

From: Andrii Deinega <andrii.deinega@gmail.com> 
Sent: Tuesday, October 6, 2020 2:25 PM
To: vittorio.bertocci@auth0.com; oauth@ietf.org
Cc: Jim Manico <jim@manicode.com>; Nicolas Mora <nicolas@babelouest.org>
Subject: Re: [OAUTH-WG] JWT access tokens and the revocation endpoint

 

Vittorio and WG,

 

Would it be possible to include something like the following to https://tools.ietf.org/html/draft-ietf-oauth-access-token-jwt-10


In case the authorization server exposes the introspection, revocation, and OpenID Connect userinfo endpoints they MUST act in the same way as it happens with a regular access token. That allows the AS to change the type of an access token on the fly and that won’t lead to interoperate issues. Plus, the consumers of these endpoints use them regardless of the type of access token.

 

The way how the AS can notify RSs that the token revocation event happened (if it decides to do so) is completely left to implementers.

 

?

 

Another minor editorial thing from me is it would possible to change and refer to "JWT access tokens" as AJWT. Thus, this document won't repeat the token word twice.

 

Regards,

Andrii

 

On Tue, Oct 6, 2020 at 2:22 PM <vittorio.bertocci=40auth0.com@dmarc.ietf.org <mailto:40auth0.com@dmarc.ietf.org> > wrote:

Hey Jim, regarding
> Every logout event should trigger token revocation
That isn’t necessarily the case. An access token represents the ability of a client to access a given resource; the fact that it requires an authentication transaction/session establishment to be issued to the client does not mean that the AT lifetime is tied to the lifetime of that session. Say that I allow LinkedIn to tweet on my behalf. Once I have done that, it doesn’t matter whether I stay logged in their web app or otherwise. Even if I log out of the session in which context I got my twitter AT, I can still post on LinkedIn from my native LinkedIn app and the corresponding post will show up on twitter as well.
Now, one might choose to *explicitly* tie tokens lifetime to originating sessions lifetime, see the discussion on the OpenID Connect group about a possible online_access scope for influencing RTs and Ats (in particular, in the context of SPAs) but that's additional semantic that isn’t defined today.

-----Original Message-----
From: OAuth <oauth-bounces@ietf.org <mailto:oauth-bounces@ietf.org> > On Behalf Of Jim Manico
Sent: Sunday, October 4, 2020 5:17 PM
To: Nicolas Mora <nicolas@babelouest.org <mailto:nicolas@babelouest.org> >
Cc: oauth@ietf.org <mailto:oauth@ietf.org> 
Subject: Re: [OAUTH-WG] JWT access tokens and the revocation endpoint

> In this model, considering that token revocations don't happen a lot...

Just a brief note, a secure piece of software makes the logout feature prominent. Every logout event should trigger token revocation.

I’m mentioning this because a lot of OAuth solutions in the mobile space literally ignore the logout event, such as Facebook’s mobile OAuth solution. 

- Jim

> On Oct 4, 2020, at 6:55 AM, Nicolas Mora <nicolas@babelouest.org <mailto:nicolas@babelouest.org> > wrote:
> 
> Hello,
> 
>> Le 20-10-04 à 11 h 27, Thomas Broyer a écrit :
>> 
>>    There might be some kind of pushed events between the AS and the RS when
>>    a JWT AT is revoked, to allow the RS not to introspect a JWT AT at all.
>>    Like this, the RS knows if a JWT AT has been revoked or not.
>> 
>> 
>> If there are some kind of pushed events between the AS and the RS, 
>> then it could push the revoked (and/or expired) opaque AT too, giving 
>> almost no advantage to JWT ATs.
>> 
> Not necessarily, let's say the AS informs the RS only of the revoked 
> ATs, when a RS checks an AT, it verifies the signature first, then the 
> claims, then checks if the AT has been revoked by checking its 
> internal list filled by the AS pushed events.
> 
> In this model, considering that token revocations don't happen a lot, 
> the ratio revoked AT/valid AT is very low, so the advantage of a JWT 
> is important, because it means not so much communication between the 
> AS and the RSs, and a very reliable AT.
> 
> But this means a communication mechanism that isn't standardized yet.
> 
> /Nicolas
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org <mailto:OAuth@ietf.org> 
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org> 
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org <mailto:OAuth@ietf.org> 
https://www.ietf.org/mailman/listinfo/oauth