Re: [OAUTH-WG] OK to post OAuth Bearer draft 15?

Mike Jones <Michael.Jones@microsoft.com> Mon, 19 December 2011 01:01 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39A5121F8AA9 for <oauth@ietfa.amsl.com>; Sun, 18 Dec 2011 17:01:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.298
X-Spam-Level:
X-Spam-Status: No, score=-2.298 tagged_above=-999 required=5 tests=[AWL=-1.299, BAYES_50=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lcjR82XndJrs for <oauth@ietfa.amsl.com>; Sun, 18 Dec 2011 17:01:03 -0800 (PST)
Received: from AM1EHSOBE005.bigfish.com (am1ehsobe005.messaging.microsoft.com [213.199.154.208]) by ietfa.amsl.com (Postfix) with ESMTP id 1B58B21F8A71 for <oauth@ietf.org>; Sun, 18 Dec 2011 17:01:02 -0800 (PST)
Received: from mail76-am1-R.bigfish.com (10.3.201.254) by AM1EHSOBE005.bigfish.com (10.3.204.25) with Microsoft SMTP Server id 14.1.225.23; Mon, 19 Dec 2011 01:00:56 +0000
Received: from mail76-am1 (localhost [127.0.0.1]) by mail76-am1-R.bigfish.com (Postfix) with ESMTP id 9B64C500080; Sat, 12 May 2012 01:01:19 +0000 (UTC)
X-SpamScore: -33
X-BigFish: VS-33(zzbb2dI9371I1447M542M1432N98dKzz1202hzz8275ch1033IL8275dhz2fh2a8h668h839h944h286p)
X-Forefront-Antispam-Report: CIP:131.107.125.8; KIP:(null); UIP:(null); IPV:NLI; H:TK5EX14MLTC101.redmond.corp.microsoft.com; RD:none; EFVD:NLI
X-FB-SS: 13,
Received-SPF: pass (mail76-am1: domain of microsoft.com designates 131.107.125.8 as permitted sender) client-ip=131.107.125.8; envelope-from=Michael.Jones@microsoft.com; helo=TK5EX14MLTC101.redmond.corp.microsoft.com ; icrosoft.com ;
Received: from mail76-am1 (localhost.localdomain [127.0.0.1]) by mail76-am1 (MessageSwitch) id 1336784479213979_24934; Sat, 12 May 2012 01:01:19 +0000 (UTC)
Received: from AM1EHSMHS019.bigfish.com (unknown [10.3.201.254]) by mail76-am1.bigfish.com (Postfix) with ESMTP id 24CF4480048; Sat, 12 May 2012 01:01:19 +0000 (UTC)
Received: from TK5EX14MLTC101.redmond.corp.microsoft.com (131.107.125.8) by AM1EHSMHS019.bigfish.com (10.3.206.22) with Microsoft SMTP Server (TLS) id 14.1.225.23; Mon, 19 Dec 2011 01:00:55 +0000
Received: from TK5EX14MBXC283.redmond.corp.microsoft.com ([169.254.2.84]) by TK5EX14MLTC101.redmond.corp.microsoft.com ([157.54.79.178]) with mapi id 14.02.0247.005; Sun, 18 Dec 2011 17:00:58 -0800
From: Mike Jones <Michael.Jones@microsoft.com>
To: Mark Nottingham <mnot@mnot.net>
Thread-Topic: OK to post OAuth Bearer draft 15?
Thread-Index: Acy6zxL5vGVpwSHMTIKvMNNyq2nAEgARlkuAAK9WC5A=
Date: Mon, 19 Dec 2011 01:00:57 +0000
Message-ID: <4E1F6AAD24975D4BA5B16804296739435F772D1D@TK5EX14MBXC283.redmond.corp.microsoft.com>
References: <4E1F6AAD24975D4BA5B16804296739435F763122@TK5EX14MBXC283.redmond.corp.microsoft.com> <F6FCE30E-20FE-4FCD-AC31-AB227A42F2D2@mnot.net>
In-Reply-To: <F6FCE30E-20FE-4FCD-AC31-AB227A42F2D2@mnot.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [157.54.51.37]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
Cc: Barry Leiba <barryleiba@computer.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OK to post OAuth Bearer draft 15?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Dec 2011 01:01:05 -0000

Thanks for your comments, Mark.  Here are my thoughts on the issues that you see as being outstanding.  I'd also welcome additional input from the working group on these topics:

ON THE URI QUERY PARAMETER METHOD:

It seems like your objection to this is based on it using a standard query parameter name.  It therefore seems like there are four possible resolutions to this issue:

1.  Delete the query parameter method, as you suggested in your initial comments.  Given that I know this method is in widespread use in certain contexts, I doubt that there would be working group consensus for this resolution.

2.  Use a method for discovering the query parameter name.  It's my understanding that discovery work is presently out of scope for the OAuth working group as currently chartered.  The chairs and area directors could obviously change this, but it's my sense that developing a discovery spec for this purpose would delay the approval of this spec by a significant period of time.  I also question whether working group consensus could be developed for this resolution.

3.  Change the normative requirement for using the name access_token to a recommendation.  Specifically, we could change the text "When sending the access token in the HTTP request URI, the client adds the access token to the request URI query component ... using the 'access_token' parameter" to "When sending the access token in the HTTP request URI, the client adds the access token to the request URI query component ... using a query parameter.  It is RECOMMENDED that the query parameter name 'access_token' be used".  (If we change this to RECOMMENDED, I suspect we'd also do the same for the name of the form-encoded body parameter.)  This would seem to resolve your core objection, while still providing clear guidance to aid interoperability.  What would people think of this?

4.  Leave the specification as-is.

I'd like to hear working group opinions on which of these potential resolutions members support.

ON THE WWW-AUTHENTICATE RESPONSE HEADER FIELD:  

See the follow-up discussion with Julian.

ON THE REALM AND SCOPE DEFINITIONS:

You wrote "That's not a great story for interop. How are people actually supposed to use them? Can you at least give an example?"  I agree with you that that's not a great story for interop but it's also the current reality of OAuth usage.  Indeed, I know that different deployments use them in different ways for different things.  There's a bunch of information that currently needs to be exchanged in a manner not covered by the specifications to use OAuth between parties.  Among other things, this includes the endpoint addresses, the ways that realm and scope are used, and (when not opaque) the format of the access token.

(Profiles of OAuth such as OpenID Connect address this by providing specific guidance, but that guidance, I believe, is too specific to add to the OAuth specs themselves.)

Given that both scope and realm are used in practice in different ways by different deployments, I don't see a clear resolution to this issue other than to leave the spec as-is.  I'd welcome specific alternative wording proposals, however.

ON SPECIFYING ONLY A QUOTED-STRING SERIALIZATION:

I understand and agree with your desire to promote code reuse.  You cite HTTPbis P7 2.3.1 to support adding a requirement for supporting token serialization in addition to quoted-string serialization for all parameters.  I believe that the relevant text there is:
      When the auth-param syntax is used, all parameters ought
      to support both token and quoted-string syntax, and syntactical
      constraints ought to be defined on the field value after parsing
      (i.e., quoted-string processing).  This is necessary so that
      recipients can use a generic parser that applies to all
      authentication schemes.

      Note: the fact that the value syntax for the "realm" parameter is
      restricted to quoted-string was a bad design choice not to be
      repeated for new parameters.

First, it's my understanding that this text was added between -16 and -17 explicitly to try to force a change the definitions used in the Bearer spec.  While this seems heavy-handed, be that as it may.   Assuming the specification remains as-is, I think there are two code reusability cases to consider:

Recipient Case:  Recipients are able to use code capable of parsing both token and quoted-string syntax to parse fields that may only contain quoted string syntax.  Thus, the rationale for this requirement given in P7 is actually incorrect; recipients *can* use a generic parser that applies to all authentication schemes.  (Perhaps P7 should be corrected?)  There is no code-reuse problem for recipients.

Producer Case:  I will grant that it is possible for generic parameter producer code to exist that does not give the caller control over how the parameter is serialized.  If such code is used, it would be possible for a parameter value such as "xyz" to be erroneously serialized as xyz, thus creating an interoperability problem.  Note however, that serialization of the HTTP-defined realm parameter MUST occur using quoted-string serialization.  Thus, in practice, it would seem that generic frameworks still need to enable callers to control the serialization formats of specific parameters.  Hence, I doubt that this problem-in-theory is actually a problem-in-practice.  I'd be interested in data points from the working group about whether HTTP frameworks they use would have his problem in practice or not.

It seems that there are two possible resolutions to this issue:

1.  Change the spec to allow both quoted-string and token serialization for these parameters.

2.  Leave the specification as-is.

I'd like to hear working group opinions on which of these potential resolutions members support.

ON SUITABILITY AS A PROXY AUTHENTICATION SCHEME:

Could someone who is a member of ietf-http-wg@w3.org volunteer to ask that list whether they would like to make any review comments on http://tools.ietf.org/html/draft-ietf-oauth-v2-bearer-15 as to its suitability for use as a proxy authentication scheme (and to cc: me when you ask the question)?  I'm not a member of this list.

				Thanks all,
				-- Mike

-----Original Message-----
From: Mark Nottingham [mailto:mnot@mnot.net] 
Sent: Wednesday, December 14, 2011 6:37 PM
To: Mike Jones
Cc: Stephen Farrell; Hannes Tschofenig; Peter Saint-Andre; Barry Leiba; OAuth WG
Subject: Re: OK to post OAuth Bearer draft 15?

Hi Mike -

It's not my function to object (or not) to the publication of the draft; I merely provided the APPS review, which will be considered by the responsible AD (like all other Last Call comments), and potentially the IESG.

If you're asking whether my concerns have been addressed, see some specifics below.

Regards,


On 15/12/2011, at 1:13 PM, Mike Jones wrote:

> Mark, Stephen, Hannes, and Barry,
>  
> Any objections to posting the updated Bearer draft incorporating the results of the APPS Area review and the TLS requirements?
>  
>                                                             -- Mike
>  
> From: Mike Jones 
> Sent: Monday, December 12, 2011 8:51 AM
> To: Mark Nottingham; 'Stephen Farrell'; oauth@ietf.org
> Subject: RE: [OAUTH-WG] FW: [apps-discuss] APPS Area review of draft-ietf-oauth-v2-bearer-14
>  
> Thanks for the detailed review, Mark.
>  
> Preliminary draft 15 of the OAuth Bearer specification is attached.  It resolves the form encoding issues raised by Julian Reschke in the manner discussed at the working group meeting in Taipei, incorporates the consensus text on TLS version requirements, and contains several improvements suggested by Mark Nottingham during APPS area review.
>  
> Mark, comments on all your proposed changes follow below:
>  
>> * Section 2.3 URI Query Parameter
>>  
>> This section effectively reserves a URI query parameter for the draft's use. This should not be done lightly, since this would be a precedent for the IETF encroaching upon a server's URIs (done previously in RFC5785, but in a much more limited fashion, as a tactic to prevent further, uncontrolled encroachment).
>>  
>> Given that the draft already discourages the use of this mechanism, I'd recommend dropping it altogether. If the Working Group wishes it to remain, this issues should be vetted both through the APPS area and the W3C liaison.
>>  
>> (The same criticism could be leveled at Section 2.2 Form-Encoded Body Parameter, but that at least isn't surfaced in an identifier)
>>  
> There are some contexts, especially limited browsers and/or development environments

What does "developmental environments" mean here?

> , where query parameters are usable but the other methods are not.  Thus, the query parameter method must be retained.  Also, Justin Richter's comments describing the value to him of the query parameter method are pertinent:  "A URL with all parameters including authorization is a powerful artifact which can be passed around between systems as a unit".
>  
> As to using a standard parameter name, this is essential for interoperability.

I find it hard to believe that you could not find or design a mechanism to discover a URI.


> It is not "reserved" in any contexts other than when the Bearer spec is employed, which is a voluntary act by both parties.  Thus, this poses no undue burdens or namespace restrictions on implementations in practice.
>  
> Finally, you'll find that OAuth 1.0 [RFC 5849] similarly defined, not one, but two standard query parameter values:  oauth_token and oauth_verifier.  As this didn't cause any problems in practice then, I'm sure that defining an access_token parameter within the Bearer spec for interoperability purposes won't cause a problem either.

The fact that a non-standards-track document did something that's potentially harmful doesn't make it OK. Saying that problems won't occur based upon such short-term implementation experience with this type of issue is ludicrous; the nature of the issue is long-term encroachment and setting precedent.


>>  * Section 3 The WWW-Authenticate Response Header Field
>>  
>> The draft references the quoted-string ABNF from HTTP, but changes its processing in a later paragraph:
>>  
>> """In all these cases, no character quoting will occur, as senders are prohibited from using the %5C ('\') character."""
>>  
>> This is at best surprising (as many readers will reasonably surmise that using the quoted-string ABNF implies that the same code can be used).
>> Please either use quoted-string as defined (i.e., with escaping).
>>  
> This parameter definition was a result of significant working group discussion and reflects a solid consensus position.  Using the quoted string BNF makes it clear, per Julian Reschke's suggestions, that generic parameter parsing code can be safely used.  Whereas prohibiting the use of backslash quoting by senders also makes it clear that custom implementations can directly utilize the parameter values as transmitted without performing any quote processing.
>  
> In short, the spec doesn't change the processing of quoted strings.  It simply restricts the set of legal input characters within the quoted strings.

See follow-up discussion with Julian.


>> * Section 3 The WWW-Authenticate Response Header Field
>>  
>> The difference between a realm and a scope is not explained. Are the functionally equivalent, just a single value vs. a list?
>>  
> Realm is as defined by HTTPbis.  It says that "The realm value is a string, generally assigned by the origin server, which can have additional semantics specific to the authentication scheme."

Yes...

> The Bearer specification intentionally adds no extra semantics to the realm definition.  Whereas the scope parameter is defined as an order-independent space-separated list of scope values.  The contextual meaning of both the realm and scope parameters is deployment-dependent.

That's not a great story for interop. How are people actually supposed to use them? Can you at least give an example?


>>  Do you really intend to disallow *all* extension parameters on the challenge?
>  
> Yes.  There was an explicit working group consensus decision to do so.

It would be good to note this.


>> Also, the scope, error, error_description and error_uri parameters all specify only a quoted-string serialisation. HTTPbis strongly suggests that new schemes allow both forms, because implementation experience has shown that implementations will likely support both, no matter how defined; this improves interoperability (see p7 2.3.1).
>  
> Once again, the current text reflects a consensus decision of the working group.  It was viewed that requiring support for multiple ways of doing the same thing unnecessarily complicated implementations without any compensating benefit; better to support one syntax for each semantic operation and require all implementations to use it.

And I'm sure you're aware that the goal of this text in HTTPbis is to encourage reuse of code, rather than having multiple implementations of slightly different things. This is doubly true when you're not actually defining the syntax, but instead reusing syntax from elsewhere (HTTP), which already has parsers and generators implemented. 


>> * General
>>  
>> The draft currently doesn't mention whether Bearer is suitable for use as a proxy authentication scheme. I suspect it *may*; it would be worth discussing this with some proxy implementers to gauge their interest (e.g., Squid).
>>  
> Who would you recommend review the draft from this perspective?

The easiest way would be to ask on the ietf-http-wg@w3.org mailing list; there are several intermediary implementers active there.

Regards,

--
Mark Nottingham   http://www.mnot.net/