Re: [OAUTH-WG] Adam Roach's Discuss on draft-ietf-oauth-jwt-bcp-06: (with DISCUSS and COMMENT)

Yaron Sheffer <yaronf.ietf@gmail.com> Fri, 05 July 2019 15:33 UTC

Return-Path: <yaronf.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E925E120183; Fri, 5 Jul 2019 08:33:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uj5QbfsO_HBy; Fri, 5 Jul 2019 08:33:29 -0700 (PDT)
Received: from mail-wm1-x32e.google.com (mail-wm1-x32e.google.com [IPv6:2a00:1450:4864:20::32e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 671721200C3; Fri, 5 Jul 2019 08:33:29 -0700 (PDT)
Received: by mail-wm1-x32e.google.com with SMTP id p74so6461452wme.4; Fri, 05 Jul 2019 08:33:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=7///RpGhMSF9BASaw6TL49mjeeDrRzZuHG4VI3/09e8=; b=f4tPrW2dcFBeA3kMmTHLtZt774gQcl6GsV03QYSZDn/6IhF7ml9If01Pe6iJhurICN lZ24hps+/1ruBxorLt5n5fFiRv1cW8TI2lBUHS++fdA80o2B4cTkUq3qj4jDwWS6AvC4 MVBsrGddkm8VoBIMfKj+T8JX+Hb/EgbcymwEdwXJZxc8CcvJAOsqIP+gM8F55RHYeRSP 1JwfgS/YRlGPu+1pfWkBdwQAH/6ld/n8UHBJRRmY+60BRDcCssKaxZOQABu2RsqmhJQb QWoykBtqxYqXtB2BjGjxzx4H4NWB9uNIWMYDH242B0PZOCWpiaxCJDIi8zhc1CPMPmEG hxEQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=7///RpGhMSF9BASaw6TL49mjeeDrRzZuHG4VI3/09e8=; b=ow09YHz31r4cfhOsn5gFErr76d112wVCCuyzeWBzgXJmGSQt8fG7QmnV9FVY5ipcQk bOcNwMQQJeKZis9x9C81ZOo2hq7LFBSFFPeApxZ1tiu5YNrxixSf8lfCOcPq8uWk9jVE 83CS7OAaAXqpL2hHFb5pRsKZBefGxvoLAstklPPLBqaPNKRsY2/ZkqOgrtcSGK54lZl7 1E/cvKxA/F+ySHdxviliPcLcPZL8loeq/IWzhmlLK90emFwajvRSp0UU+BHu7ntHf3m8 PxPG/aFsXmeVGOI6CLuh7f9b2AjmmQimpmaJNeva5GhTX5mQqlEwh5KZgPGAXxGsw9xc Lcmw==
X-Gm-Message-State: APjAAAU5cUXTW2qUxEMVUadLZEZ+0/AaFahcqjag1BHAK4K12wfqmjtc UtkR7YB1pWba/MxzHEwI2xspjDFa
X-Google-Smtp-Source: APXvYqwfkAW1rk8PXrdUvR83Q2HkTS4iuM3A/DzEDTlAGglAViSRjHNKoolhoEjl4mRIRUNZywOudg==
X-Received: by 2002:a1c:f212:: with SMTP id s18mr3649318wmc.86.1562340807691; Fri, 05 Jul 2019 08:33:27 -0700 (PDT)
Received: from [10.0.0.156] (bzq-109-67-125-172.red.bezeqint.net. [109.67.125.172]) by smtp.gmail.com with ESMTPSA id y24sm9364346wmi.10.2019.07.05.08.33.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 05 Jul 2019 08:33:27 -0700 (PDT)
To: Adam Roach <adam@nostrum.com>, The IESG <iesg@ietf.org>
Cc: draft-ietf-oauth-jwt-bcp@ietf.org, Hannes Tschofenig <hannes.tschofenig@arm.com>, oauth-chairs@ietf.org, oauth@ietf.org
References: <156143908719.24005.13391480103830414058.idtracker@ietfa.amsl.com>
From: Yaron Sheffer <yaronf.ietf@gmail.com>
Message-ID: <4c470be6-67e7-41f5-d8c9-6501b48f3609@gmail.com>
Date: Fri, 05 Jul 2019 18:33:24 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2
MIME-Version: 1.0
In-Reply-To: <156143908719.24005.13391480103830414058.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/unSTfKuLXHbi-ASWmEm1dYXaPSs>
Subject: Re: [OAUTH-WG] Adam Roach's Discuss on draft-ietf-oauth-jwt-bcp-06: (with DISCUSS and COMMENT)
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Jul 2019 15:33:40 -0000

> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> Thanks for everyone who worked to get this document out the door. I found it to
> be well-organized and easy to read.
> 
> ---------------------------------------------------------------------------
> 
> This is a process discuss for Roman to handle, and I plan to clear it
> during the IESG formal telechat.
> 
> This document is intended for BCP status. It has a normative reference to RFC
> 8017, which is an informational document. Checking the last call text
> (https://datatracker.ietf.org/doc/draft-ietf-oauth-jwt-bcp/edit/lastcalltext/),
> there is no mention of RFC 8017, nor does RFC 8017 appear in the downref
> registry (https://datatracker.ietf.org/doc/downref/).
> 
> Thanks to RFC 8067, we are not required to run this document through IETF LC
> again (and, given that RFC 8017's predecessor, RFC 3447, is in the registry,
> we probably don't want to). However, we'll need to minute that the point was
> raised and addressed. There is also at least one additional requirement
> imposed by section 2 of RFC 8067 that needs to be satisfied (see the last
> sentence in that section).
> 

Resolved by Roman in a subsequent message.

> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> §3.2:
> 
>>   That said, if a JWT is cryptographically protected by a transport
>>   layer, such as TLS using cryptographically current algorithms, there
>>   may be no need to apply another layer of cryptographic protections to
>>   the JWT.
> 
> It may be helpful to distinguish between end-to-end TLS encryption (such as that
> seen in HTTPS, even in the presence of proxies) and hop-by-hop TLS encryption
> (such as that seen in SIPS when proxies are present). In the latter case,
> intermediaries may perform attacks that would otherwise only be possible to
> mount by the endpoints.
> 
> My concrete suggestion is to modify the above text to read "...protected
> end-to-end by a transport layer, such as..."
>

Yes. Fixed in the upcoming -07.

> ---------------------------------------------------------------------------
> 
> §3.2:
> 
>>   -  Avoid all RSA-PKCS1 v1.5 [RFC2313] encryption algorithms,
>>      preferring RSA-OAEP ([RFC8017], Sec. 7.1).
> 
> It's not clear to me what this recommendation intends to say regarding the
> algorithms in RFC 2437 and RFC 3447. One might infer that they're deprecated
> as well. If this is the intention, please be explicit.
> 
> 

Yes this is confusing. For consistency, we will also reference PKCS1 
v1.5 from RFC 8017 (which is the only recent, non-obsoleted RFC out of 
this chain).

Thanks,
	Yaron