Re: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession

Mike Jones <> Wed, 25 November 2015 02:10 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 5F2E61ACDAE for <>; Tue, 24 Nov 2015 18:10:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id SDgc_ieIn_R8 for <>; Tue, 24 Nov 2015 18:10:47 -0800 (PST)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 37D221ACDA7 for <>; Tue, 24 Nov 2015 18:10:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=selector1; h=From:To:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=taL4nscvEm+JLprfK4+He5ed+THjIYXKpN7cKFX80H8=; b=nh4FqWYa1irg1LZMexZGFlO62hFW7BXvgxOQVo8JGCaWVxgx9oFhoaHPEgymw1wqkM9qZf+AxrhMw5+2PjYftcLmeW7Ipx8P8TKUibAxIIV7dvXgSTAAX2C2XBT3T4/dRBWSyGWBK3eKtI8GuR35MtLu5MZj5CUvbwX7HGsAehw=
Received: from ( by ( with Microsoft SMTP Server (TLS) id 15.1.331.20; Wed, 25 Nov 2015 02:10:45 +0000
Received: from ([]) by ([]) with mapi id 15.01.0331.023; Wed, 25 Nov 2015 02:10:45 +0000
From: Mike Jones <>
To: Justin Richer <>, Kathleen Moriarty <>
Thread-Topic: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession
Thread-Index: AQHRJt++kWDp0FqlfEmPEzc+Ih7voJ6rg5iAgABl3iA=
Date: Wed, 25 Nov 2015 02:10:45 +0000
Message-ID: <>
References: <> <>
In-Reply-To: <>
Accept-Language: en-US
Content-Language: en-US
authentication-results: spf=none (sender IP is );
x-originating-ip: [2001:4898:80e8:a::650]
x-microsoft-exchange-diagnostics: 1; BY2PR03MB441; 5:k4qQUan3Mj25TuzbFBMGIOgvEyOFQ4mQtaItvw7GJuc20tzyHcHRm35TgMQdu/y4TR7LHk2bUNd7jecIOiU2C5TOfqAb9PaEPEB3tyHiki+P26QY7vwgAubrAoA2eyPso3PqRFo1TQtt/srO1p6Iag==; 24:TjKIt21JrIL3nTkxLa7t1FaT5EcVTrSvWJcOldlnvcQOR4RX8qP41841jl4RoMNm5QUPbiilQ6h9KlUJAcSV9BC5EaZ4sPmGHijRp0X4a6U=
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY2PR03MB441;
x-microsoft-antispam-prvs: <>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425024)(601004)(2401047)(8121501046)(5005006)(520078)(3002001)(10201501046)(61426024)(61427024); SRVR:BY2PR03MB441; BCL:0; PCL:0; RULEID:; SRVR:BY2PR03MB441;
x-forefront-prvs: 0771670921
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(24454002)(199003)(189002)(13464003)(377454003)(43784003)(6116002)(5002640100001)(102836003)(2171001)(230783001)(586003)(87936001)(99286002)(122556002)(105586002)(74316001)(5003600100002)(50986999)(40100003)(106116001)(76176999)(106356001)(5007970100001)(11100500001)(86612001)(54356999)(86362001)(8990500004)(33656002)(10090500001)(10400500002)(5004730100002)(10290500002)(5005710100001)(189998001)(77096005)(5001770100001)(5001920100001)(5001960100002)(2900100001)(81156007)(5008740100001)(15975445007)(76576001)(92566002)(97736004)(19580405001)(101416001)(19580395003)(2950100001)(3826002); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR03MB441;; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None ( does not designate permitted sender hosts)
spamdiagnosticoutput: 1:23
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Nov 2015 02:10:45.7944 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR03MB441
Archived-At: <>
Cc: "<>" <>
Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: OAUTH WG <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 25 Nov 2015 02:10:49 -0000

Thanks Justin.  Upon rereading this section with Kathleen's and your comments in mind, I removed all the text that you were objecting to and replaced it with the new last paragraph of the security considerations section, which makes the point that ultimately, what features must be implemented are always up to the application, just as with JWT claims.

				Thanks again,
				-- Mike

-----Original Message-----
From: OAuth [] On Behalf Of Justin Richer
Sent: Tuesday, November 24, 2015 10:48 AM
To: Kathleen Moriarty <>
Cc: <> <>
Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-proof-of-possession

I suggest removal of the reference to bearer tokens in this section, since that seems to suggest that this is what the RS should do in such a case. What’s really going to happen is that an RS is going to get a request with this token and it’s going to have to figure out how to deal with it. If there’s a signature (like in http-message-signing) then it’s going to need to find the key. If it can’t read the key out of the cnf claim then it won’t be able to validate the signature and won’t process the message. If that’s the case then this RS can’t accept this token. 

This has nothing to do with bearer tokens vs. PoP tokens. It’s not really any different from an RS accepting JWT bearer tokens needing to be able to parse or process the JWT bearer token to figure out what it’s good for. Right?

 — Justin

> On Nov 24, 2015, at 12:44 PM, Kathleen Moriarty <> wrote:
> Hi,
> Thank you all for your work on this draft!  I just have a few questions:
> 1. Security considerations section says:
> "All of the normal security issues, especially in relationship to
>   comparing URIs and dealing with unrecognized values, that are
>   discussed in JWT [JWT] also apply here."
> I find that to be odd phrasing that would likely be picked up in 
> subsequent reviews.  Please remove the word "normal" so that all of 
> the security issues discusses in JWT are included.  Are there other 
> 'normal considerations in addition to those in JWT that need to be 
> listed?  The phrasing reads as if that may the case and would be 
> better to include them all or pointers or change the phrasing.
> 2. Also in the security considerations section,
>   "A recipient may not understand the newly introduced "cnf" claim and
>   may consequently treat it as a bearer token."
> What is the proper handling requirement when an unknown claim is 
> present?  Section 3.1 says:
>  "When a recipient receives a "cnf" claim with a
>   member that it does not understand, it MUST ignore that member."
> Is this why it is treated as a bearer token rather than being 
> rejected?  Is this really the action you want to see with cnf?  Why 
> isn't there an error and a resend as a bearer token so that parties 
> understand (or have an opportunity to understand) that there were 
> issues?
> Then the following text in the security section says:
>  "While this is a
>   legitimate concern, it is outside the scope of this specification,
>   since demonstration the possession of the key associated with the
>   "cnf" claim is not covered by this specification. For more details,
> How is this outside of the scope of this draft?  cnf is defined in 
> this draft, so handling should be covered in this draft.  A pointer to 
> the POP architecture draft is not helpful as it is not defined there, 
> it's covered int his draft.  Should this text just be removed and 
> replaced with more explicit handling information int he body of this 
> draft?
> Thanks!
> --
> Best regards,
> Kathleen
> _______________________________________________
> OAuth mailing list

OAuth mailing list