[OAUTH-WG] convert to credentialed client... ( was OAuth2.1 credentialed client )

Brian Campbell <bcampbell@pingidentity.com> Mon, 11 October 2021 17:35 UTC

Return-Path: <bcampbell@pingidentity.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFE083A0E5D for <oauth@ietfa.amsl.com>; Mon, 11 Oct 2021 10:35:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=pingidentity.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZtY39C5WPI9H for <oauth@ietfa.amsl.com>; Mon, 11 Oct 2021 10:35:09 -0700 (PDT)
Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C01293A079E for <oauth@ietf.org>; Mon, 11 Oct 2021 10:35:08 -0700 (PDT)
Received: by mail-lf1-x129.google.com with SMTP id j21so59110897lfe.0 for <oauth@ietf.org>; Mon, 11 Oct 2021 10:35:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pingidentity.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=CKO3j4gbxlIJDgh41YdEKmT+BURfORr8FtYyyDwLlks=; b=doBZoZD1Kyemf98yLFyndnkMzzPt1njG8xGfQuct/2BJYjCrEouodlPbN60RK0+DFB UXqHGo8GYRSKTToSHzymcLn/GFHTR9pWZkRXW9kpMSjD0/eMqRnNnQUML4vxbGhHwNMW 2sTAg6GIBDJBfH8ocp8lEUNwEJAahWLNpjOEhtyhZuZsLL//0vYLXm2cqtKKFsZQD8Ag NOxuwUGAzBQ1+mran+bVgm+FNNNcVeoC4yKq7Ru0wTEEnYz9Sopp2GLEAmxlVPCalqe9 y7g2qRRgPYrguqOuZuhN+X2J5TbkN3Pa4LLYkFu1qyLYxLmEsH7oRB+QlALFdLHM9dV6 OxvQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=CKO3j4gbxlIJDgh41YdEKmT+BURfORr8FtYyyDwLlks=; b=m2uAR3aW3tC32y0hgkCWGFa03tt9zJQcUojzYX+CNKkr23uzvkdRgCpUY1MjWWkq0W Wjy9RPI1RcAOgQJXodZtdoF3fRoHcxDUO1X7PA1VlIEf6mbgt4wDZ/enduXgnGtrl01r kISYa6r8pY4m4OXixL/YJfiAjG9e2XcSHBA4Re5yO8LWNmtDDhyBL/kOO+oz74V7pj89 yPsZ8CtQua+AHa+Sl7OsynU2mAQ/J8aiTNIbq7wG4Tx5cgICcwFuCrqtu9knXt2Bdn75 Y88OMP1Jztg3mflbqdc0T9Xk4YYplRzvJJMP7SLrEukyElELOJqXn79ONvDRjm6FjUIw lQIg==
X-Gm-Message-State: AOAM532sfcHX57IWiRuFZI906htebIv13Q53XAN+FTdcOfvZyjJMQF/N 7PC8yEaQ5fw+lnHjfR6glvZUZo1adXTXwh9iu6q3WVwq0dhtzH584RZ68AwbZo+ewrtRYUDR+l+ S8tqkTQI2BW5OkixZCMy7Hw==
X-Google-Smtp-Source: ABdhPJxV5SN8s9R6PNUhq6VJDgpvtKrz1q9Z/vHxIGz9VfSOz56m+pQE/pgY2U+Ye9IAJnwGtBReduZvGcU06jw3A/4=
X-Received: by 2002:a05:6512:23aa:: with SMTP id c42mr27795735lfv.573.1633973705036; Mon, 11 Oct 2021 10:35:05 -0700 (PDT)
MIME-Version: 1.0
References: <163347956410.26563.6262394233835671220@ietfa.amsl.com> <CAGBSGjryjQ3pnh+RnGnxqjCENgG-6td1JBSG4tV9VZfVSaKvnQ@mail.gmail.com> <CAFvbn=YisYSbu8sL+TLgRakJ52oA6TEQSJ8i_4+9qNNQ0b9bkA@mail.gmail.com>
In-Reply-To: <CAFvbn=YisYSbu8sL+TLgRakJ52oA6TEQSJ8i_4+9qNNQ0b9bkA@mail.gmail.com>
From: Brian Campbell <bcampbell@pingidentity.com>
Date: Mon, 11 Oct 2021 11:34:39 -0600
Message-ID: <CA+k3eCTsi37FGKwCdA4CJgJ3PFux8JJxV4aDk42X5p61a70qBQ@mail.gmail.com>
To: Ash Narayanan <ashvinnarayanan@gmail.com>
Cc: Aaron Parecki <aaron@parecki.com>, OAuth WG <oauth@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000042fd3f05ce1726e5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/rLA90VHXyoqhOEA9VAAycwoIg5o>
Subject: [OAUTH-WG] convert to credentialed client... ( was OAuth2.1 credentialed client )
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Oct 2021 17:35:14 -0000

Credentialed clients might be worthwhile item for the interim. I think I
sorta get what the credentialed clients distinction is trying to do but the
way it manifests in the draft is somewhat bewildering. One example I've
struggled to make sense of is the following text from
https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-04.html#section-2.4 -
I honestly don't understand what it really means and what actual
ramifications would be to implementations/deployments:

"The authorization server MAY establish a client authentication method with
public clients, which converts them to credentialed clients. However, the
authorization server MUST NOT rely on credentialed client authentication
for the purpose of identifying the client."


On Fri, Oct 8, 2021 at 8:57 PM Ash Narayanan <ashvinnarayanan@gmail.com>
wrote:

> I'm not sure if these items have been brought up previously or are already
> on the agenda to be discussed at the interim meeting.
>
> Referring to the latest draft (
> https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-04.html) ...
>
> 1. The definition given under section 2.1 Client Types is:
>
>> Clients that have credentials but no prior relationship with the AS are
>> designated as "credentialed clients"
>
>
> This does not seem like the best or even the right definition to me. The
> definition as it stands, is in two parts:
> a) "Clients that have credentials"
> b) Clients that have "no prior relationship with the AS"
>
> With (a), the typical use-case is an app that runs on the end-user device
> and dynamically registers itself with the AS. Such a client does not "have"
> credentials to begin with, or at least the use of the word "have" here, if
> it's intended to mean "at some point will have", does not differentiate it
> from confidential clients, which are also defined to be clients "that have
> credentials".
> Instead, a better choice of words for credentialed clients may be "Clients
> that dynamically obtain credentials".
>
> (b) is not necessarily true, because the credentialed client may very well
> be a known client and therefore have a prior relationship with the AS.
> Think of (common) scenarios where the AS and client are both part of the
> same organisation or a peer organisation, and therefore the client metadata
> an AS receives in a dynamic registration request is already known to the
> AS. An AS may only decide to accept dynamic registrations from such known
> clients.
>
> Of course I may not be interpreting "prior relationship" as it may be
> intended, in which case that needs to be clarified somewhere.
>
>
> 2. Continuing with section 2.1 Client Types, for a native application, it
> says:
>
>> On the other hand, dynamically issued credentials such as access tokens
>> or refresh tokens can receive an acceptable level of protection.
>
>
> Why is this also not mentioned for a browser-based application? Unless I'm
>  mistaken, in terms of accessibility for an intruder, in-memory for a
> native app is equivalent to in-memory for an SPA and local storage for a
> native app is equivalent to local storage for an SPA.
>
>
> Cheers,
> Ash
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

-- 
_CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately 
by e-mail and delete the message and any file attachments from your 
computer. Thank you._