Re: [OAUTH-WG] OAuth Digest, Vol 129, Issue 23

Rafal <alfabeta69@yahoo.com> Wed, 17 July 2019 22:32 UTC

Return-Path: <alfabeta69@yahoo.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A387C120168 for <oauth@ietfa.amsl.com>; Wed, 17 Jul 2019 15:32:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.841
X-Spam-Level:
X-Spam-Status: No, score=-0.841 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, FREEMAIL_REPLYTO_END_DIGIT=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, REPTO_QUOTE_YAHOO=0.646, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_MIME_MALF=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=yahoo.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B3PFpnmzrt44 for <oauth@ietfa.amsl.com>; Wed, 17 Jul 2019 15:32:09 -0700 (PDT)
Received: from sonic312-26.consmr.mail.ir2.yahoo.com (sonic312-26.consmr.mail.ir2.yahoo.com [77.238.178.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 908651200EB for <oauth@ietf.org>; Wed, 17 Jul 2019 15:32:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1563402724; bh=n4jcsjWcCmzNW2w0GEmDhKEZ0ULHQEpQuWzAQoQgCEc=; h=Date:From:Reply-To:To:In-Reply-To:References:Subject:From:Subject; b=Fg3hZzICNcpejZuvzTlfeNes8YcnYF9CbY+bkkoO5kYElZfEfhht4/KHyXM1XvehNPE50iWyCWuvODzH4yTnMAzojJg/GPtsvaHGceP4yg9iu2sYHjL/wN+RpWaKwTqBLB4oq8/inLVGBH8vylsnq+QRV4MAYjrPlY7x75FeBhbRge4LmJamDeXCRD28YNuUCuqTJvgK+yKcATk6Fz/KEWrzLMWgrk+oyKvewIGQMMBQIf4eGbrZvcrU+/qs4DJhgXbJWPK4I2On2M1uk2pP2uDDY7k0yW6lOrMnc6tgqIPvpubFlyIxBmBPTdQEQ0MXdpdSl/PpiWtA6qheduoRag==
X-YMail-OSG: vSdor0IVM1mj0YPSpYAHkGWOL5rEkEuUrvYXVPwXuw6xUf7lCUzhdiebsk9I8YH YCfajordckrg4B5wc2Cxk85DSNzupprnEt6sqBjhiYoxB4h2oXWBvESWRwxs3hE6itqb8vaTCndO u0kJt0UCpsMfK7RjtrJkCYXB6w3dNZQGGGdG70gAHjylKtUrIvfCuAwnW2sm_ea0AZrrbP9p2frW yRyP90Hjuw2YYGUWQyjliqKPGlpQu7pw8RwlGeSguQXekh_YYb6SYSF8HiszJxwIwTS1n75SPqp_ 0yM1I6oOir1gj8lVVa0nuKuEjxBtncDuMorer2B6R5B07c0QQbO982d14r3NB_5KkRge_VSOtMlj 0psctvCf4zXbrjiISFhrjA0G8NGGpkuHCNd1K4cXqfBIQXcxjjbLE7oXPvlQCMQO6SMGdUnuSH1m R7g90YI66Cj5KB4yHIcFkMQ9Gpjv34uLQj4bIyHzcZQ23oAOiycgn6wBaT4VQFrFw21ZJhYXDIS_ RIdHB1h_VQa4JILVEPEDdAWf3n2eSuLelpf1KKd9yyCVt11y64LghUITuGbtF3960MtFsIqfkaRV sxQ6QQOg.n9pbo3FCNzdtYbb_VRbbur7igNc8Qtoi2nGyOtDcjnl5E29EZsKcXW7a.asVxxcEJjn XYcA.w15jALyDPupfLmU52AFLd7V6dr6dgO648Cdg5r0UFPItMBC1QOy2QC_3P2toOBGoVy8JXiK XoKn7_lYT_AfoUmu2RMTWyenXQenWAaTlyJsSQRwdLeso_.DLLJI88P3jXrIXmoWsp9BltLkB14B 2dK04ryz_OX69dQPOHij0S9Ehep.oXv16vtOwFnPlqmRZFaWfmPGAhXHyMf5sxTeT1nUnev6LgWp a0vzqz_ETMJPmq3aElpv_saKDAudOurAAC6p.zKNZTIES1j80hC8Aj_JohFzcjn6TSf7Uy2nb9hd XunFn8iUqTCFqPKvF5UZ.TvB7o4sZMAWv6aRKYGdKBD.h1bonDuBLSuDc.dnbi4w_i.QpEB5fuM1 MZFO7Pt62UR7hFn1s_lmjeh08FQABNcGvEt1h.CL5JZbIVAxNgwq_Z15h_IRlkp488KUzWztfQIr T3FrNVNHX3cAeUR5klUqeVLBHsZkUCfyUsojgtt.6oNNQzSw3SFt4S00vkILxFsBiuWRiVn0bY4S _eGYWavzGksZy25bR4TEVbBe7nT_jlHpRx2y.h3RlwOYK_2Kp1IFYL.xD9K2sw0AmDoCBeqW2onu m8yh7XNq9o1mXqAfveDfXrBRjrvVZAp4zxr5sQPHiSg9bvwtRfpCIx.s-
Received: from sonic.gate.mail.ne1.yahoo.com by sonic312.consmr.mail.ir2.yahoo.com with HTTP; Wed, 17 Jul 2019 22:32:04 +0000
Received: by smtp424.mail.ir2.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID ffaf1640168c4d8f86deca0044ed4c43; Wed, 17 Jul 2019 22:32:01 +0000 (UTC)
X-YMail-OSG: 8q18xeQVM1k7X5v5uY_QvvZ.viw_f4GP.Wlqtp1izNJHDBdGjFrXHAG.pDTImIq LH3QbKeCMsmnxWFWz10UKph.W88icEcYb0d4RICEs4JIAi9l8BbhH8E8ONFUB3qCdDhuSBE62ACr HJ_mO211Hmbv7SKCzGvGgwoCySsjsy24xkyBRhgRQnqP.0jMVvf7wEII3FhwvZVixn.CSSCYmBwl Zfm5RQDbfFiMvbnMkaFOpRn2stiRPCd1fEDTY3fIT0ehcJLRTNMUqlJ.Wr5qj3vdhmxyyTFhK7LY gxXTby8A89BOFnNOP8RJtLeN6BsTCnZ.oq_HxDjjNhmbZI7TseF.fnTv1UuZ4tZfTWnDqDu6F2UD K7sNDBNYWFwKn7eOXcS8eEbR9zZVr3fdGDjLqoC0bxdV4N8onO4ZGn6g_u1DVXbGC.8c4nxXI_Km sF43oeuZhHaN_hBzY9hfN.PmdqR4FcS.luqHJWs4c_lwmrFkQZ2k1k2aJGN22rEU7TodscrzGZyQ OpfT9RQApugfAufoMZ1BQ4JwaenM_w4APchnqpTQfMCklJRj9dfacYevSAEUL86vHLdL09ftrqBK hx08ryP.SXgu9K8xf5yzIHXN2JerQUWkt0EiYVREVJg1g_6ookvyxjMaSTpqnqbXLtg1ERIOU2y2 1GbejMTYYCnMtzf0T0.TLUz6F6Kox6yvx1FzTfNniVk8WpFrRoYvovMyKKaGeWYqWaqfCLZSDkH6 xCf49ljaF_PqtRvhvbpQOoR0SvdDMFa2w.blsLj.naFVU1TZc5IqZRCW5IwlflH1xhyK9NROlNOn c7.ybpA7Ms2Y.weEK1wJRAsQSOpZnbUvuAiIk3I1CalnoxW8DU29YIhpX8jmsgQRBV.ws5wg3XlV WRR_MR48iN6sANrFtPGijtOUZGKYDZcwavehrr74luJyyNsqJ7C93BaMD99M2Qc23W8UXgUz.UlI 95_g4VEeTU_fjVutTS4BDnqKJ1RMEvMezIOwB4NgSSxyF9kbuStnyzRB9rLzsYgsFuoTfWCdvLJa u5NENjW4puX.UFNECMs9Zm2ZyGRNa3AkczrRAIymMc3mfs1qsxmBH9.iUQdxJsUVMswLq9ev1xxB SYJHHrtdzxrY1qEoPHwH6cl3SDBf1YnNz8smvjpc._aXFiMUiNxDtrMpujNo3B8nkHe3EOoiNtIl keYq0UkDJwZLF6oQ1MxJKsP8l.JU9YcPEOjxkIP_K6KFNUDJ_29UDpb3PuHNoE_DF89DoVgOJN1Q BC2FN3aYjXjTUBA0nkikfXlE-
Received: from sonic.gate.mail.ne1.yahoo.com by sonic304.consmr.mail.ir2.yahoo.com with HTTP; Wed, 17 Jul 2019 22:32:00 +0000
Date: Wed, 17 Jul 2019 22:31:59 +0000
From: Rafal <alfabeta69@yahoo.com>
Reply-To: "alfabeta69@yahoo.com" <alfabeta69@yahoo.com>
To: "oauth@ietf.org" <oauth@ietf.org>, "oauth-request@ietf.org" <oauth-request@ietf.org>, "oauth@ietf.org" <oauth@ietf.org>
Message-ID: <29018055.4070624.1563402719512@mail.yahoo.com>
In-Reply-To: <mailman.785.1563401097.9467.oauth@ietf.org>
References: <mailman.785.1563401097.9467.oauth@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_4070623_696090853.1563402719504"
X-Mailer: WebService/1.1.13991 YahooMailAndroidMobile YMobile/1.0 (com.yahoo.mobile.client.android.mail/5.40.2; Android/7.0; NRD90M; A5A_INFINI; TCL; 5086D; 5.24; 1352x720; )
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/qGngFoKbpVkVjYI7x0s8fszhrnE>
Subject: Re: [OAUTH-WG] OAuth Digest, Vol 129, Issue 23
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jul 2019 22:32:14 -0000

Heartblit@yahoo.com,rafal.rogala@aol.com, rogalarafal69@gmail.com, rogalarafal96@gmail.com,24piotrpawel22@gmail.com, heartblit@heartblit.org,aidis_addict@outlook.be, atomic_flow@hotmail.com,microsheart@outlook.com,rafalrogala@rafal.rogala.com,rogalik1000@interia.pl

Sent from Yahoo Mail on Android 
 
  On Thu, 18 Jul 2019 at 0:05, oauth-request@ietf.org<oauth-request@ietf.org> wrote:   Send OAuth mailing list submissions to
    oauth@ietf.org

To subscribe or unsubscribe via the World Wide Web, visit
    https://www.ietf.org/mailman/listinfo/oauth
or, via email, send a message with subject or body 'help' to
    oauth-request@ietf.org

You can reach the person managing the list at
    oauth-owner@ietf.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of OAuth digest..."


Today's Topics:

  1. Re: AD Review: draft-ietf-oauth-resource-indicators-02
      (Brian Campbell)
  2. Re: AD Review: draft-ietf-oauth-resource-indicators-02
      (Roman Danyliw)
  3. Re: AD Review: draft-ietf-oauth-resource-indicators-02
      (Roman Danyliw)


----------------------------------------------------------------------

Message: 1
Date: Wed, 17 Jul 2019 14:35:17 -0600
From: Brian Campbell <bcampbell@pingidentity.com>
To: Roman Danyliw <rdd@cert.org>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] AD Review:
    draft-ietf-oauth-resource-indicators-02
Message-ID:
    <CA+k3eCRS2HKDUWkHQzwoMVauUK7UBadw_pWdF6cXh0+BSZTbBA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

Thank you, Roman, for the review. Some replies are inline below. I'll aim
to push out a -03 addressing this stuff sometime not too long after the I-D
submission embargo is lifted next week.


On Tue, Jul 16, 2019 at 5:23 PM Roman Danyliw <rdd@cert.org> wrote:

> Hi!
>
> The following is my AD review of draft-ietf-oauth-resource-indicators-02.
> The document is in good shape.
>

That's always nice to hear :-)


>
> (1) Section 2. Per "The parameter can carry the location of a protected
> resource, typically as an https URL, or a more abstract identifier", is
> this "abstract identifier" still an absolute URI per Section 4.3 of RFC3986?
>

Absolutely (see what I did there? sigh...). Syntactically it's an absolute
URI. Semantically, while it might be an actual network addressable location
identified by an HTTPS URL, it might also be a URN or something that more
abstractly indicates a resource or grouping of resources. But its format is
an absolute URI regardless.

I'm not sure what, if anything, can be added or changed here to help
clarify. But I'm happy to entertain suggestions, if you've got em and/or
think something is needed.



> (2) Section 2.2.  in the sentence "To the extent possible, when issuing
> access tokens, the authorization server should adapt the scope value
> associated with an access token to the value the respective resource is
> able to process and needs to know":
>
> --  is this language suggesting that the authorization server is modifying
> the scope value based on the resource it sees?  I'm trying to understand
> what "adapt" means, especially in relation to the improved security and
> privacy the subsequent sentence suggests.
>

Perhaps "adapt" wasn't the best choice of word but it's meant to say that
an authorization server with sufficient understanding of what scopes are
applicable to what resources (which won't always be the case or even
possible but sometimes) could limit the scope associated with an access
token (downscoping really) to only the scope that is applicable to the
resource.

Some of the examples (figures 2 - 6) attempt to show, among other things, a
hypothetical case of how this might go down.

In Figure 2 the initial authorization request that's approved has scope of
calendar & contacts and resources https://contacts.example.com/ &
https://cal.example.com/

A subsequent access token request (Figure 3) has resource
https://cal.example.com/ and the issued access token scope (Figure 4) is
"adapted" to that resource to be only calendar

Another subsequent access token request (Figure 5) has resource
https://contacts.example.com/ and the issued access token scope (Figure 6)
is downscoped based on that resource to be only contacts

Would it be easier to understand if the word "downscope" was used rather
than "adapt"?



>
> -- (Depending on the above) Is there a security consideration here for the
> server relative to confidential scope values and how they might be modified?
>

I'm not sure, to be honest. Downscopping when possible and to the extent
possible is usually a good idea (least privilege and all that) but I think
maybe I'm missing your point/question.



>
> (3) Editorial
> ** Section 1 and 2.1.  Multiple Typo.  s/the the/the/g
>

Apparently I'm fond of the double "the" and have a hard time spotting it
myself. I think this is the second review in as many weeks that you've
caught a few of those. Will fix.


>
> ** Section 2.  Editorial. s/resource at which/resource to which/
>

Okay.


>
> ** Section 2.  Editorial.
> s/ And can also be used to inform the client that it has requested an
> invalid combination of resource and scope./
>        It can also be used to inform the client that it has requested an
> invalid combination of resource and scope./
>

Yup.


>
> ** Section 2.1. Multiple Typo. s/an an/an/g
>

Again with the double words. Sigh. A double double even.



> ** Section 2.2.  Editorial. s/token request and response/token request
> (Figure 3) and response (Figure 4)/
>

Makes sense.



> ** Section 3.  Typo.  s/a invalid/an invalid/
>

Of course.


>
> ** Section 3.  Missing words.  "A bearer token that has multiple intended
> recipients (audiences) can be used by any one of those recipients at any
> other."  Is it protected resource?
>

Well, those are all the words that I'd intended to be there :/ But it does
read a little curtly. How about the following instead?

"A bearer token that has multiple intended recipients (audiences)
indicating that the token is valid at more than one protected resource can
be used by any one of those protected resources to access any of the other
protected resources."

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.? If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20190717/50785876/attachment.html>

------------------------------

Message: 2
Date: Wed, 17 Jul 2019 21:13:07 +0000
From: Roman Danyliw <rdd@cert.org>
To: "'oauth@ietf.org'" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] AD Review:
    draft-ietf-oauth-resource-indicators-02
Message-ID: <359EC4B99E040048A7131E0F4E113AFC01B33D76EF@marchand>
Content-Type: text/plain; charset="us-ascii"

Hi!

I forgot one more thing about this draft after re-reading draft-ietf-oauth-token-exchange.

Per the IANA action in Section 4.1, I need help understanding on the thinking to resolve this TODO:

  o  Parameter usage location: authorization request, token request
      [[TODO: draft-ietf-oauth-token-exchange will have already
      registered this for 'token request' and this draft has a more
      generalized usage and needs to somehow either update that
      registration or do a partial registration and reference]]
  o  Change controller: IESG
  o  Specification document(s): [[ this specification ]]

My read of draft-ietf-oauth-token-exchange it that it defines 'resource' for 'token exchange'.  This draft (draft-ietf-oauth-resource-indicators) has guidance on 'resource' for 'authorization request' but also additional guidance for 'token request'.  Is the token guidance request stated here applicable to draft-ietf-oauth-token-exchange too (i.e., is the text effectively saying oauth-resource-indicators updates oauth-token-exhange)?  I ask because these drafts don't reference each other.

Correct me because there is likely a history, but it seems the TODO is that there is a dependency to resolve and a need to coming up with a way to signal in the registry which draft should be read for what usage location.  Could draft-ietf-oauth-resource-indicators officially register 'resource'; and instead of draft-ietf-oauth-token-exchange including the text defining 'resource' in Section 2.1, it would make a normative reference to Section 2 of draft-ietf-oauth-resource-indicators?

Roman

> -----Original Message-----
> From: Roman Danyliw
> Sent: Tuesday, July 16, 2019 7:23 PM
> To: oauth@ietf.org
> Subject: AD Review: draft-ietf-oauth-resource-indicators-02
> 
> Hi!
> 
> The following is my AD review of draft-ietf-oauth-resource-indicators-02.
> The document is in good shape.
> 
> (1) Section 2. Per "The parameter can carry the location of a protected
> resource, typically as an https URL, or a more abstract identifier", is this
> "abstract identifier" still an absolute URI per Section 4.3 of RFC3986?
> 
> (2) Section 2.2.  in the sentence "To the extent possible, when issuing access
> tokens, the authorization server should adapt the scope value associated
> with an access token to the value the respective resource is able to process
> and needs to know":
> 
> --  is this language suggesting that the authorization server is modifying the
> scope value based on the resource it sees?  I'm trying to understand what
> "adapt" means, especially in relation to the improved security and privacy the
> subsequent sentence suggests.
> 
> -- (Depending on the above) Is there a security consideration here for the
> server relative to confidential scope values and how they might be modified?
> 
> (3) Editorial
> ** Section 1 and 2.1.  Multiple Typo.  s/the the/the/g
> 
> ** Section 2.  Editorial. s/resource at which/resource to which/
> 
> ** Section 2.  Editorial.
> s/ And can also be used to inform the client that it has requested an invalid
> combination of resource and scope./ It can also be used to inform the client
> that it has requested an invalid combination of resource and scope./
> 
> ** Section 2.1. Multiple Typo. s/an an/an/g
> 
> ** Section 2.2.  Editorial. s/token request and response/token request
> (Figure 3) and response (Figure 4)/
> 
> ** Section 3.  Typo.  s/a invalid/an invalid/
> 
> ** Section 3.  Missing words.  "A bearer token that has multiple intended
> recipients (audiences) can be used by any one of those recipients at any
> other."  Is it protected resource?



------------------------------

Message: 3
Date: Wed, 17 Jul 2019 22:04:49 +0000
From: Roman Danyliw <rdd@cert.org>
To: Brian Campbell <bcampbell@pingidentity.com>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] AD Review:
    draft-ietf-oauth-resource-indicators-02
Message-ID: <359EC4B99E040048A7131E0F4E113AFC01B33D784A@marchand>
Content-Type: text/plain; charset="utf-8"

Hi Brian!

From: Brian Campbell [mailto:bcampbell@pingidentity.com]
Sent: Wednesday, July 17, 2019 4:35 PM
To: Roman Danyliw <rdd@cert.org>
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] AD Review: draft-ietf-oauth-resource-indicators-02

Thank you, Roman, for the review. Some replies are inline below. I'll aim to push out a -03 addressing this stuff sometime not too long after the I-D submission embargo is lifted next week.


On Tue, Jul 16, 2019 at 5:23 PM Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>> wrote:
Hi!

The following is my AD review of draft-ietf-oauth-resource-indicators-02.  The document is in good shape.

That's always nice to hear :-)


(1) Section 2. Per "The parameter can carry the location of a protected resource, typically as an https URL, or a more abstract identifier", is this "abstract identifier" still an absolute URI per Section 4.3 of RFC3986?

Absolutely (see what I did there? sigh...). Syntactically it's an absolute URI. Semantically, while it might be an actual network addressable location identified by an HTTPS URL, it might also be a URN or something that more abstractly indicates a resource or grouping of resources. But its format is an absolute URI regardless.

I'm not sure what, if anything, can be added or changed here to help clarify. But I'm happy to entertain suggestions, if you've got em and/or think something is needed.

[Roman] Understood.  Concur there is nothing to do here.


(2) Section 2.2.  in the sentence "To the extent possible, when issuing access tokens, the authorization server should adapt the scope value associated with an access token to the value the respective resource is able to process and needs to know":

--  is this language suggesting that the authorization server is modifying the scope value based on the resource it sees?  I'm trying to understand what "adapt" means, especially in relation to the improved security and privacy the subsequent sentence suggests.

Perhaps "adapt" wasn't the best choice of word but it's meant to say that an authorization server with sufficient understanding of what scopes are applicable to what resources (which won't always be the case or even possible but sometimes) could limit the scope associated with an access token (downscoping really) to only the scope that is applicable to the resource.

Some of the examples (figures 2 - 6) attempt to show, among other things, a hypothetical case of how this might go down.

In Figure 2 the initial authorization request that's approved has scope of calendar & contacts and resources https://contacts.example.com/ & https://cal.example.com/

A subsequent access token request (Figure 3) has resource https://cal.example.com/ and the issued access token scope (Figure 4) is "adapted" to that resource to be only calendar

Another subsequent access token request (Figure 5) has resource https://contacts.example.com/ and the issued access token scope (Figure 6) is downscoped based on that resource to be only contacts

Would it be easier to understand if the word "downscope" was used rather than "adapt"?

[Roman] Using ?downscope? does work for me.  It captures that the server is going to reduce the scope (and certainly not expand it).


-- (Depending on the above) Is there a security consideration here for the server relative to confidential scope values and how they might be modified?

I'm not sure, to be honest. Downscopping when possible and to the extent possible is usually a good idea (least privilege and all that) but I think maybe I'm missing your point/question.

[Roman] Yes, least privilege was part of it and I think the text above gets at it.  However, the other part is the relationship with the next sentence in the paragraph, ?This further improves privacy as scope values give an indication of what services the resource owner uses and it improves security as scope values may contain confidential data?.  If the initial request was notionally a scope of ?all the houses on the block?, but the server knew that this request was too broad and down-scoped to ?only the corner house?, wouldn?t this actually be worse for privacy?  I also don?t follow how reducing the scope impacts confidential data.


(3) Editorial
** Section 1 and 2.1.  Multiple Typo.  s/the the/the/g

Apparently I'm fond of the double "the" and have a hard time spotting it myself. I think this is the second review in as many weeks that you've caught a few of those. Will fix.


** Section 2.  Editorial. s/resource at which/resource to which/

Okay.


** Section 2.  Editorial.
s/ And can also be used to inform the client that it has requested an invalid combination of resource and scope./
        It can also be used to inform the client that it has requested an invalid combination of resource and scope./

Yup.


** Section 2.1. Multiple Typo. s/an an/an/g

Again with the double words. Sigh. A double double even.



** Section 2.2.  Editorial. s/token request and response/token request (Figure 3) and response (Figure 4)/

Makes sense.


** Section 3.  Typo.  s/a invalid/an invalid/

Of course.


** Section 3.  Missing words.  "A bearer token that has multiple intended recipients (audiences) can be used by any one of those recipients at any other."  Is it protected resource?

Well, those are all the words that I'd intended to be there :/ But it does read a little curtly. How about the following instead?

"A bearer token that has multiple intended recipients (audiences) indicating that the token is valid at more than one protected resource can be used by any one of those protected resources to access any of the other protected resources."

[Roman] Thanks for fixing all of these.


CONFIDENTIALITY NOTICE: This email may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited.  If you have received this communication in error, please notify the sender immediately by e-mail and delete the message and any file attachments from your computer. Thank you.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailarchive.ietf.org/arch/browse/oauth/attachments/20190717/de45ad15/attachment.html>

------------------------------

Subject: Digest Footer

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


------------------------------

End of OAuth Digest, Vol 129, Issue 23
**************************************