[OAUTH-WG] Draft OAuth WG meeting minutes for 3:20-4:20 16-Nov-16 in Seoul

Mike Jones <Michael.Jones@microsoft.com> Wed, 16 November 2016 08:07 UTC

Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E4C0127058 for <oauth@ietfa.amsl.com>; Wed, 16 Nov 2016 00:07:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.021
X-Spam-Level:
X-Spam-Status: No, score=-2.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bNleKoIkfgn7 for <oauth@ietfa.amsl.com>; Wed, 16 Nov 2016 00:07:08 -0800 (PST)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0104.outbound.protection.outlook.com [104.47.32.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6F2D812967D for <oauth@ietf.org>; Wed, 16 Nov 2016 00:07:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=xpcMNndQPht7CkiRbK1ZKi+Mp3nr4kE2aeWcS6MH5UY=; b=kh9oazcSM+k2pFggUM7SAlt/R8BtqCmqVJRZZH7+S43hz0mddyHH7OvDcPz421Yhq/rrfSfweZUyvWyBltwbeybfNj9EdLdzsluUQaX7Crc0oAPUj4fQTj2OjjWbw62w8h5HlNRhrsTDk7BgEgy7Tlmesn4wdbjBH9+cPgutwVE=
Received: from BN3PR03MB2355.namprd03.prod.outlook.com (10.166.74.150) by BN3PR03MB2353.namprd03.prod.outlook.com (10.166.74.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.721.10; Wed, 16 Nov 2016 08:07:04 +0000
Received: from BN3PR03MB2355.namprd03.prod.outlook.com ([10.166.74.150]) by BN3PR03MB2355.namprd03.prod.outlook.com ([10.166.74.150]) with mapi id 15.01.0721.015; Wed, 16 Nov 2016 08:07:04 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Thread-Topic: Draft OAuth WG meeting minutes for 3:20-4:20 16-Nov-16 in Seoul
Thread-Index: AdI/0mUhJ70MUmR8TP6FZN2Y2mzdTA==
Date: Wed, 16 Nov 2016 08:07:04 +0000
Message-ID: <BN3PR03MB235514934A5A41E2A7F56F27F5BE0@BN3PR03MB2355.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com;
x-originating-ip: [2001:67c:370:144:4422:9589:299f:2232]
x-microsoft-exchange-diagnostics: 1; BN3PR03MB2353; 7:lDzR2f7MGX1aklZuT/FYFoudhiSVDXkqQQBFT6OgqHwUaWeQ6lzFHQ2+5rhQtsL72qiZl6x64GhnbxcvXuWBsw0aij0+AdXIdFjyq0ILAO6ASqcFI2DtoOaxWDWPDIvbXOpSCgENE7xVIxa+dJDvIHbpcAhB/PoJNU6qHm/zMdfEPUCu/UHUFNZATFG3PRQDkT7lxwRNbI9SsCBqyWBm6wLs6h6FmTbiTrwZBatfaFiVNtl2ZKlIOtUTCRcsJhQj0UJ7PV8d31UjUNJjCDTwcQeTVUpi3rieKCnzp/6mv+GcvQahBuf/e5gcDlLJ3VugHiiq575XNuMVBTxt7wLhW06yQ/XxN7ibzztRrCRB11SowzBT25Oihn/FXqZ/PpuG
x-ms-office365-filtering-correlation-id: cc8ed2f5-dee7-40ff-e20a-08d40df78d99
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BN3PR03MB2353;
x-microsoft-antispam-prvs: <BN3PR03MB23532AF8C4DB98D1E62E9B34F5BE0@BN3PR03MB2353.namprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(278428928389397)(192374486261705)(788757137089)(100405760836317)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425038)(6060326)(6045074)(6040281)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026)(61426038)(61427038)(6041223)(6046074)(6061324); SRVR:BN3PR03MB2353; BCL:0; PCL:0; RULEID:; SRVR:BN3PR03MB2353;
x-forefront-prvs: 01283822F8
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(199003)(189002)(106356001)(2900100001)(81156014)(10290500002)(450100001)(97736004)(2351001)(1730700003)(3660700001)(9686002)(5005710100001)(86612001)(6916009)(76576001)(3280700002)(81166006)(33656002)(99286002)(54356999)(6116002)(6506003)(2906002)(790700001)(551934003)(68736007)(92566002)(7846002)(7736002)(230783001)(74316002)(8990500004)(101416001)(105586002)(102836003)(8676002)(189998001)(50986999)(122556002)(10090500001)(7696004)(87936001)(77096005)(5660300001)(86362001)(5640700001)(107886002)(8936002)(5630700001)(2501003)(110136003); DIR:OUT; SFP:1102; SCL:1; SRVR:BN3PR03MB2353; H:BN3PR03MB2355.namprd03.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BN3PR03MB235514934A5A41E2A7F56F27F5BE0BN3PR03MB2355namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Nov 2016 08:07:04.8036 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN3PR03MB2353
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ofd5a57kfkOXeglOM33QuHgTphM>
Subject: [OAUTH-WG] Draft OAuth WG meeting minutes for 3:20-4:20 16-Nov-16 in Seoul
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Nov 2016 08:07:12 -0000

Rich Salz helped Hannes Tschofenig run the meeting as a guest facilitator

Brian Campbell discussed the status of Token Exchange
              Hannes: The consensus during the Monday meeting was to gain more implementation experience before WGLC
              Hannes asked who is implementing or planning to implement Token Exchange
                            Justin Richer
                            Brian Campbell
                            Mike Jones
                            Dick Hardt
                            Tony Nadalin
                            William Denniss expressed an interest in having Google do so during the previous meeting

Torsten Lodderstedt presented about his new draft on security issues revealed by practical OAuth deployments
              draft-lodderstedt-oauth-security-topics
              He wants to provide practical guidance to implementers
              OAuth is used in much more complex and dynamic setups than originally anticipated
              This is intended to be a working document - not a standard
                           Capture threats and mitigations
              He plans to refer to other drafts, for instance the mix-up-mitigation draft
              He plans to have there be a list of things that developers need to do to securely use OAuth
              Tony Nadalin:  We've had a lot of discussions at Microsoft lately on the large number of OAuth documents
                           Developers are having problems combining them together and knowing what to implement
                           Tony agrees with what Torsten is trying to do but doesn't think that it's enough
              Torsten: We're focusing first on documenting the obvious problems
                           We didn't update the security model when we added dynamic registration, for instance
                           There's a need to recommend best practices
              Tony Nadalin:  The many OAuth add-ons are not part of an overall architecture
                           For instance, PKCE was just a patch solving a problem we could have avoided up front
              Ben Kaduk: You should go ahead and do this even without working group adoption
                           Torsten: I want it to record the conclusions of the working group - not just my personal opinions
              Dick Hardt:  Why are we starting on this now?
                           Torsten: Because we understand many of the security best practices now
              Dick:  Why not broaden the scope from security best practices to OAuth best practices?
                           Torsten:  Because it would get huge
              John Bradley: That's just a document management issue.  I support working on best practices.
                           I believe we need to adopt this so that it becomes an RFC so that it is taken seriously by some stakeholders
                           BCPs should be task-oriented
                           For instance, someone doing a single page application may not need to be concerned about Token Exchange
              Hannes: Doing focused BCPs seems more manageable than trying to do a comprehensive architecture document
              Torsten:  Security practices are cross-cutting
              Dick:  I agree that the security BCP should be all in one place
              Torsten:  We need feedback on which scenarios and flows matter most to people
              William Denniss:  I think it should be a BCP and be an RFC as soon as possible
                           I like the BCP model of being able to snapshot and revise

              Hannes: Who is in favor of adopting this as a WG document?
                           At least 15 were in favor and no one opposed
                            Kathleen Moriarty:  It looks good
              Hannes:  Let's make OAuth great again

Justin Richer presented on the motivations for the HTTP Signing document
              draft-ietf-oauth-signed-http-request
              The current spec includes signing, presentation of the token, and a method for protecting the HTTP request
              OAuth 2.0 doesn't include HTTP message signing, whereas OAuth 1.0 did
                           Developers often got signing wrong in OAuth 1.0
              Justin's draft is designed for the real world understanding that many things will be changed in transit
                           Therefore, you only sign the things that you know you care about and will be unchanged
              There are corner cases that the spec does not cover
              This is all optional
              The base signature is over the access token plus the nonce/timestamp/transaction-identifier

              Justin proposes putting the HTTP signing in one document and the base signature description in another
                           The HTTP signing can be experimental
                           This is a detached signature
              He proposes to move both documents forward together
              You need a method to present the PoP token to the resource
              This would be another presentation method parallel to RFC 6750
              Justin and a few others have implemented the current approach
              Ben Kaduk: Do you plan to define discovery?
                           Justin: No.  Discovery isn't defined for OAuth and so this work has taken the same position.

              Hannes: At the Berlin IETF meeting the feeling was that we didn't need to do this work anymore
              Hannes: Who thinks that we should continue this work in this working group?
                           6 for
                           3 against
              Kathleen Moriarty:  Take it to the list

              Dick Hardt:  Has anyone deployed this?
                           Justin: Not in large scale
              John Bradley: Token presentment without having an audience restriction for the token doesn't buy you much
                           If we're going to do this work, we should do that too
              Mike Jones:  I'm on record on the mailing list as saying that I don't think we should be doing this work
                           It's not clear to me that this is worth our time.  We're doing a lot and this takes time away from other things.
                           I haven't seen a groundswell of people wanting to deploy this
              Hannes:  Per Kathleen, we need to take it to the list
              Kathleen:  This discussion seems pretty stuck to me

John Bradley spoke about the resource indicator specification and other outstanding work
              There is implementation experience with the resource indicator
              John plans to do a BCP about single-page (JavaScript) applications
              Torsten: We should focus on the most relevant BCP
              Tony Nadalin:  Single-page applications are not a major focus within Azure

              Hannes: I will send a note to the list asking people which BCPs they would like to see
              John: We also have lingering work for using postMessage to replace fragment encoding
                            postMessage is complicated.  It probably requires a lot of guidance
                            Torsten:  We should ask people whether this is important to them
                           Mike Jones:  The postMessage draft is an individual submission - not a working group document