Re: [OAUTH-WG] PAR: pushed requests must become JWTs

Torsten Lodderstedt <torsten@lodderstedt.net> Wed, 08 January 2020 22:50 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4D6312010C for <oauth@ietfa.amsl.com>; Wed, 8 Jan 2020 14:50:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lodderstedt.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fCMsVhtMrNht for <oauth@ietfa.amsl.com>; Wed, 8 Jan 2020 14:50:22 -0800 (PST)
Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com [IPv6:2a00:1450:4864:20::333]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6CC68120072 for <oauth@ietf.org>; Wed, 8 Jan 2020 14:50:22 -0800 (PST)
Received: by mail-wm1-x333.google.com with SMTP id p17so710757wmb.0 for <oauth@ietf.org>; Wed, 08 Jan 2020 14:50:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lodderstedt.net; s=google; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=c2GD3INB5d7vOQ+CpCaDWGS0hO2W3ALgclc7Qh1rN9c=; b=g94jkKp/CW1/RGYYhM04kN5B/FKMiAjX3mmr/jGFwziMueNfFfL4Qj/B47SnjYBJjU a/RyCsZTC4+vIxYIC2jUxMYJdvyQWGNet6zReHK9VPQt0aqOzWBydXQENSSxAOom4NuE U2AMKsWdR4vnt8AkPihu4cOtba55DC35ZUqCCw8OpBVHv2xcCF1Dkr4/t09FBOFNVJeV 6ypE1WGhPUdlKepxAIDLlQLQH4KdfCcUDGMeqxrj+mBq5qySRvICKg8ux0Kl90VJ/YNy VINsIOGBs3X57wv+AbA6NS+coJfrCDRFct96SJmOLbQflJix66lEZnkSP/IX41zFiP4e ftTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=c2GD3INB5d7vOQ+CpCaDWGS0hO2W3ALgclc7Qh1rN9c=; b=D2StKDj2dQAJ+eVv1NgZMH+1e7LLxJk1nQWgaaf4u2LStyJ/ezvdsg4CKjAoDXzgGa YlNAxLwRrh4Ba5AZoS8ROIu4FZKAoVUMbeG9qkT+CsH5KbdrlwH+7/mJDBpBKWYMvwyY 5ImxkqkAgPcJm45h0VTsLNFZ7KbBkOH3RFF3scVYw9FB8Du4B9l3H+Qm1sm+34/UsUa+ oCyzlIPCvDD8cPTE3mp8kTsCqOu1wpllqSWNiH9BGzcZUXEIU3j3l1DS5umx/dgZmOnh eKO4L0kbCEtLhvBQTz0z1zvopGb383VxQ1hE7yG6zFI4S/rVSuXfqPOj7eK2O1VAQk4S 2lMw==
X-Gm-Message-State: APjAAAW7Kl7hwrBQ9/yG1/hQaOwwWqYumYwNaM6M69Y6Z9AYqWKD6NN7 jebrtb1J0vzMYV9cyshO8sxoJA==
X-Google-Smtp-Source: APXvYqzuemxV08nqxgKodCk+Wehq/pqpci6hvIimkjItpBaU1EqKqzrL8L5+zfNBt+awEYX7z343lQ==
X-Received: by 2002:a1c:ded6:: with SMTP id v205mr972588wmg.86.1578523820261; Wed, 08 Jan 2020 14:50:20 -0800 (PST)
Received: from [10.30.4.222] ([213.151.95.78]) by smtp.gmail.com with ESMTPSA id m7sm5888075wrr.40.2020.01.08.14.50.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 08 Jan 2020 14:50:19 -0800 (PST)
From: Torsten Lodderstedt <torsten@lodderstedt.net>
Message-Id: <BE9F05FF-F71C-4C6F-B1A4-1B0BD8E1BCEA@lodderstedt.net>
Content-Type: multipart/signed; boundary="Apple-Mail=_8EFABC67-6C97-454D-B03B-C2EB264963A4"; protocol="application/pkcs7-signature"; micalg=sha-256
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3608.40.2.2.4\))
Date: Wed, 8 Jan 2020 23:49:26 +0100
In-Reply-To: <5F125471-39B2-4CF9-B5C0-353E83BC8702@amazon.com>
Cc: oauth <oauth@ietf.org>
To: "Richard Backman, Annabelle" <richanna=40amazon.com@dmarc.ietf.org>
References: <5F125471-39B2-4CF9-B5C0-353E83BC8702@amazon.com>
X-Mailer: Apple Mail (2.3608.40.2.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/e9jmmmqXzReV7e3COP9VvgnBDao>
Subject: Re: [OAUTH-WG] PAR: pushed requests must become JWTs
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jan 2020 22:50:25 -0000

Hi, 

you are right, PAR does not require the AS to represent the request as a JWT-based request object. The URI is used as internal reference only. That why the draft states 

"There is no need to make the
      authorization request data available to other parties via this
      URI.”

This difference matters from an AS implementation perspective, it doesn't matter from a client's (interop) perspective.

We may add a statement to PAR saying that request_uris issued by the PAR mechanism (MAY) deviate from the JAR definition. 

best regards,
Torsten.  

> On 8. Jan 2020, at 23:42, Richard Backman, Annabelle <richanna=40amazon.com@dmarc.ietf.org> wrote:
> 
> Hi all,
>  
> The current drafts of PAR (-00) and JAR (-20) require that the AS transform all pushed requests into JWTs. This requirement arises from the following:
> 	• PAR uses the request_uri parameter defined in JAR to communicate the pushed request to the authorization endpoint.
> 	• According to JAR, the resource referenced by request_uri MUST be a Request Object. (Section 5.2)
> 	• Request Object is defined to be a JWT containing all the authorization request parameters. (Section 2.1)
>  
> There is no need for this requirement to support interoperability, as this is internal to the AS. It is also inconsistent with the rest of JAR, which avoids attempting to define the internal communications between the two AS endpoints. Worse, this restriction makes it harder for the authorization endpoint to leverage validation and other work performed at the PAR endpoint, as the state or outcome of that work must be forced into the JWT format (or retrieved via a subsequent service call or database lookup).
>  
> – 
> Annabelle Richard Backman
> AWS Identity
>  
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth