Re: [OAUTH-WG] Next steps on the OAuth Assertion Drafts

Torsten Lodderstedt <torsten@lodderstedt.net> Sat, 28 September 2013 13:36 UTC

Return-Path: <torsten@lodderstedt.net>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C588921F9CE3 for <oauth@ietfa.amsl.com>; Sat, 28 Sep 2013 06:36:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.249
X-Spam-Level:
X-Spam-Status: No, score=-2.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0t59KJlDYsLO for <oauth@ietfa.amsl.com>; Sat, 28 Sep 2013 06:36:44 -0700 (PDT)
Received: from smtprelay01.ispgateway.de (smtprelay01.ispgateway.de [80.67.31.35]) by ietfa.amsl.com (Postfix) with ESMTP id 8182121E80DB for <oauth@ietf.org>; Sat, 28 Sep 2013 06:36:39 -0700 (PDT)
Received: from [91.2.95.180] (helo=[192.168.71.139]) by smtprelay01.ispgateway.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.68) (envelope-from <torsten@lodderstedt.net>) id 1VPuhE-0006yN-VJ; Sat, 28 Sep 2013 15:36:33 +0200
Message-ID: <5246DB60.7080109@lodderstedt.net>
Date: Sat, 28 Sep 2013 15:36:32 +0200
From: Torsten Lodderstedt <torsten@lodderstedt.net>
User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
References: <1373E8CE237FCC43BCA36C6558612D2AA33964@USCHMBX001.nsn-intra.net>
In-Reply-To: <1373E8CE237FCC43BCA36C6558612D2AA33964@USCHMBX001.nsn-intra.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Df-Sender: dG9yc3RlbkBsb2RkZXJzdGVkdC1vbmxpbmUuZGU=
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Next steps on the OAuth Assertion Drafts
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 28 Sep 2013 13:36:48 -0000

Hi all,

here are my comments:

--- Assertion Draft ---

section 4.1.

"Authentication of the client is optional, as described in Section
    3.2.1 of OAuth 2.0 [RFC6749] and consequently, the "client_id" is
    only needed when a form of client authentication that relies on the
    parameter is used."

I'm a bit confused about this statement because RFC6749, Section 3.2.1. 
states:
"Confidential clients or other clients issued client credentials MUST
    authenticate with the authorization server as described in
    Section 2.3 when making requests to the token endpoint."

The client_id is optional but recommended for public clients, only. Same 
text can be found in SAML/section 2.1 and JWT/section 2.1

section 5.1.

"the Issuer should identify the STS in a manner recognized by the 
Authorization Server."

Shouldn't the "should" be normative language? I would even prefer MUST 
instead of should.

"Issuer values SHOULD be compared using the Simple String Comparison" - 
better MUST?

"When using assertions for client authentication, the Subject
          MUST identify the client to the authorization server, typically
          by using the value of the "client_id" of the OAuth client."

Why not just "For client authentication, the subject MUST be the 
"client_id" of the OAuth client" as in the JWT Bearer and SAML assertion 
drafts?

Audience - "The URL of the Token Endpoint, as defined
       in Section 3.2 of OAuth 2.0 [RFC6749], can be used to indicate
       that the authorization server as a valid intended audience of the
       assertion."

Who uses this approach? We don't use the concrete URL of the tokens 
endpoint but the AS's base URL. I would prefer to have _a_ single, 
mandated way of identifying the AS instead of a recommendation in order 
to facilitate interop.

section 6.2

Please replace "Client Credentials flow" by "Client Credentials _Grant_"

PLEASE NOTE: most comments on the assertion draft hold for JWT and SAML 
as well because a lot of text is duplicated/shared among these drafts.

--- JWT bearer token ---

section 4

the example request is missing any client identifier/credentials, please 
add BASIC header or client_id

GENERAL NOTE: HTML links referencing to RFC 6749 are generally linked to 
the respective drafts itself

regards,
Torsten.

Am 10.09.2013 16:26, schrieb Tschofenig, Hannes (NSN - FI/Espoo):
> Hi all,
>
> I am trying to wrap up the assertion documents and I took a look at the meeting minutes from the Berlin IETF meeting and the actions are as follows:
>
> ** John & Torsten: Please post your document review to the list.
>
> ** Authors of draft-ietf-oauth-saml2-bearer: Please provide the additional SAML related text (as discussed during the meeting) and submit an updated document.
>
> Ciao
> Hannes
>
> ------- copy from the minutes --------
>
> * Assertions (BC)
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-assertions/
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-jwt-bearer/
>   https://datatracker.ietf.org/doc/draft-ietf-oauth-saml2-bearer/
>
>      - WGLC ends by 8/8
>      - BL on WGLC comments: talked to MJ about how to achieve interop.
>      - BL: describe how you could combine specifications to make at least one interoperable specification
>      - MJ: profiles exists for both SAML and OpenIDC. those are not IETF specifications though
>      - BL: ok to point to external doc from either of the I-Ds in question
>      - MJ: very achievable
>      - BL: all should go to the IESG at the same time to establish context
>      - PHO: is this for the IESG benefit or for future developers
>      - BL: the latter
>      - PHO: talk to Heather Flanagan or the IANA - they have talked about having long-term access to external documents
>      - BL: ok will consider that - or we can copy text into WG wiki
>      - BC: interop does not require external profiles actually
>      - TL: same experience at DT with the JSON-based assertion format - no addl profiles are needed
>      - MJ: a SAML deployment needs agreement on certain SAML-specific conventions - this is what BL is referring to
>      - BC: right
>      - TN: so just refer to the SAML specs
>      - BL: maybe enough
>      - JB and TL volunteered to make a review.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth