Re: [OAUTH-WG] Fwd: Re: Mandatory-to-implement token type

"Richer, Justin P." <jricher@mitre.org> Fri, 02 December 2011 22:23 UTC

Return-Path: <jricher@mitre.org>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8293821F8C48 for <oauth@ietfa.amsl.com>; Fri, 2 Dec 2011 14:23:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.048
X-Spam-Level:
X-Spam-Status: No, score=-6.048 tagged_above=-999 required=5 tests=[AWL=-0.350, BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_72=0.6, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VPqCkswgD-ma for <oauth@ietfa.amsl.com>; Fri, 2 Dec 2011 14:23:08 -0800 (PST)
Received: from smtpksrv1.mitre.org (smtpksrv1.mitre.org [198.49.146.77]) by ietfa.amsl.com (Postfix) with ESMTP id 1337D21F8C43 for <oauth@ietf.org>; Fri, 2 Dec 2011 14:23:08 -0800 (PST)
Received: from smtpksrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 3125E21B18CA; Fri, 2 Dec 2011 17:23:07 -0500 (EST)
Received: from IMCCAS03.MITRE.ORG (imccas03.mitre.org [129.83.29.80]) by smtpksrv1.mitre.org (Postfix) with ESMTP id 23C1A21B0E28; Fri, 2 Dec 2011 17:23:07 -0500 (EST)
Received: from IMCMBX01.MITRE.ORG ([169.254.1.18]) by IMCCAS03.MITRE.ORG ([129.83.29.80]) with mapi id 14.01.0339.001; Fri, 2 Dec 2011 17:23:06 -0500
From: "Richer, Justin P." <jricher@mitre.org>
To: André DeMarre <andredemarre@gmail.com>, OAuth WG <oauth@ietf.org>
Thread-Topic: [OAUTH-WG] Fwd: Re: Mandatory-to-implement token type
Thread-Index: AQHMsT+apQJKbEshjU22wgV/dnm9DZXJHyfs
Date: Fri, 02 Dec 2011 22:23:06 +0000
Message-ID: <B33BFB58CCC8BE4998958016839DE27E050625@IMCMBX01.MITRE.ORG>
References: <4ED9300B.3000009@mitre.org> <4ED93028.6030206@mitre.org>, <CAEwGkqDzm_g4bhANwCaCtN6POXRZ4ngT2JO8Kur6WtO0FO4qsQ@mail.gmail.com>
In-Reply-To: <CAEwGkqDzm_g4bhANwCaCtN6POXRZ4ngT2JO8Kur6WtO0FO4qsQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [129.83.31.56]
Content-Type: multipart/alternative; boundary="_000_B33BFB58CCC8BE4998958016839DE27E050625IMCMBX01MITREORG_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Fwd: Re: Mandatory-to-implement token type
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Dec 2011 22:23:09 -0000

I still don't see what the MTI requirement buys us in this relaxed case. We're basically dictating what the best libraries would have.

I still think "OAuth2 + Bearer" is a better compliance label than "OAuth2" if you want real interoperability, and we should treat it as its own thing.

 -- Justin

________________________________
From: André DeMarre [andredemarre@gmail.com]
Sent: Friday, December 02, 2011 5:13 PM
To: OAuth WG
Cc: Richer, Justin P.
Subject: Re: [OAUTH-WG] Fwd: Re: Mandatory-to-implement token type

+1

A server will issue whichever token types satisfy its own requirements, so IMHO the idea of an MTI token type is a concern for client implementations. We can distinguish between two categories of clients: (1) interoperable clients and (2) service-specific clients.

Obviously, service-specific clients must implement the token types used by the authorization server. Interoperable clients (probably OAuth client libraries) is where an MTI token type might have value.

We can extend the differentiation of interoperable/service-specific to authorization servers as well, where a generic OAuth server library is an interoperable server, but it becomes a service-specific server when it is used to implement an actual service.

Is this a good compromise? If the spec defines interoperable and service-specific clients and servers in such a way, then it can claim that interoperable clients and servers must implement bearer tokens (for example), but service-specific clients and servers have no MTI token type.

Regards,
Andre DeMarre


On Fri, Dec 2, 2011 at 12:08 PM, Justin Richer <jricher@mitre.org<mailto:jricher@mitre.org>> wrote:
Forwarding my response to the list. (oops)

 -- Justin

-------- Original Message --------
Subject:        Re: [OAUTH-WG] Mandatory-to-implement token type
Date:   Fri, 02 Dec 2011 15:07:39 -0500
From:   Justin Richer <jricher@mitre.org><mailto:jricher@mitre.org>
To:     Stephen Farrell <stephen.farrell@cs.tcd.ie><mailto:stephen.farrell@cs.tcd.ie>



I still don't think that having an MTI token type actually buys us
anything, and what I *really* don't understand from this entire argument
is the weight that's being put behind "Compliance with OAuth2" and what
that means.

With no MTI token type, we can still have interop for people who claim
to be compliant with "OAuth2 + OAuth2 Bearer", or to borrow the example
below, compliant with "OAuth2 + AWESOME". Both of these are compliant
with "OAuth2" because they use OAuth2 to issue their tokens. *Those*
parts of the library should work just fine to interop between each
other. Since you're getting a JSON or fragment-encoded structure back as
the token, you should be able to toss that into some kind of generic
data structure and hand it to the token-handling part of your library,
which is going to need more smarts to know what to do with it.

A robust OAuth2 library, from server or client perspective, will likely
do both Bearer and Mac and let you pick which you want. A good discovery
system will aid that. An extended library will give you AWESOME tokens
as well. *All* of these should be called compliant with OAuth2, in my
opinion, and in this case it would be compliant with "OAuth2 + Bearer +
MAC + AWESOME". A great library indeed!

Making a MTI misses the point of the composability of the system, does
absolutely nothing for real-world interop due to reasons I've already
laid out in previous emails, will cause people to ignore the spec and be
in noncompliance for something they think is dumb, have unused and
untested code just to claim compliance that nobody cares about, and
ultimately makes us look a bit silly for insisting that one solution
will fit all use cases and that we can have any sense of real authority
in this over developers.

I'd like to point out that there's no MTI token-acquisition flow, which
is arguably more important for worldwide interop and just as untenable a
solution given the reality of the internet -- and I can also guarantee
that we will never see agreement over an MTI grant type / token flow due
to the simple fact that some instances will only do client credentials
for 2-legged and some will do code for 3-legged, and the two of those
probably don't want to talk to each other.

In summary, I suggest that "compliance with OAuth2" be defined in terms
of each of the separate composable documents and their combinations, and
that "compliance with OAuth2" not be limited to a particular combination
of any of them.

 -- Justin

On 12/01/2011 09:27 PM, Stephen Farrell wrote:
>
> Hiya,
>
> On 12/02/2011 02:14 AM, Michael D Adams wrote:
>> On Thu, Dec 1, 2011 at 5:44 PM, Stephen Farrell
>> <stephen.farrell@cs.tcd.ie><mailto:stephen.farrell@cs.tcd.ie>  wrote:
>>> On 12/02/2011 01:38 AM, Michael D Adams wrote:
>>>> So an MTI token type + no client preference is equivalent to there
>>>> only existing one token type.
>>>
>>> Maybe.
>>>
>>> However, no MTI token type + no client preference = no interop.
>>>
>>> So I don't get your argument. (When thinking of interop.)
>>
>> I think it's me that doesn't understand your argument.
>
> That can be mutual:-)
>
>> Suppose an authorization server implements OAuth2 and has some
>> requirement that the MTI token type doesn't provide (as William Mills
>> suggested), so the server implements token type AWESOME in addition to
>> token type MTI.
>>
>> Whenever a token is requested, the authorization server issues one of
>> type AWESOME.  Type MTI is never issued.
>>
>> Why bother implementing type MTI if it's never used?
>
> That, I think, assumes that the requesting party only ever works with
> the AWESOME token-type issuer. Seems a shame to me that whoever wrote
> that code can't work with any other MTI token-type issuer as well, at
> least.
>
>> Additionally, the authorization server could not implement type MTI
>> but claim it did.  There's no way for a third party to verify the
>> claim since the authorization server never issues a token of type MTI.
>
> Irrelevant. I could claim to be handsome. Would work equally
> well.
>
>> If tokens of type MTI are never used by this server, how does the MTI
>> token type help interop?Is your argument that this server would say
>> "No, we do not support OAuth2.  We do, however, support
>> OAuth2+AWESOME."?  That semantic argument I understand, but I am
>> ignorant as to how/if it fits into the RFC.
>
> No, my argument is that there are many servers and many clients on
> the Internet and having them all have a way to interop, if they
> choose to do so, is a good thing in itself. Writing an RFC so that
> its a random pick as to whether they do or don't interop is not IMO
> a good thing.
>
> S.
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org<mailto:OAuth@ietf.org>
> https://www.ietf.org/mailman/listinfo/oauth



_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth