Re: [regext] WGLC: draft-ietf-regext-rdap-openid-17

"Hollenbeck, Scott" <shollenbeck@verisign.com> Wed, 05 October 2022 14:01 UTC

Return-Path: <shollenbeck@verisign.com>
X-Original-To: regext@ietfa.amsl.com
Delivered-To: regext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0729EC14CF05 for <regext@ietfa.amsl.com>; Wed, 5 Oct 2022 07:01:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=verisign.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wU_WY_LIOsZc for <regext@ietfa.amsl.com>; Wed, 5 Oct 2022 07:01:14 -0700 (PDT)
Received: from mail3.verisign.com (mail3.verisign.com [72.13.63.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5757C14F74D for <regext@ietf.org>; Wed, 5 Oct 2022 07:01:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verisign.com; l=5054; q=dns/txt; s=VRSN; t=1664978475; h=from:to:cc:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version:subject; bh=gv8OEn16pGIiWhXfbdJ9i7FTE4Ed70kk2CqAhGW9c7U=; b=gKpru3fT3ShMHkH/OkcjWSkDVoAv7rpZdhpt0XsSNpTsMA8YNpchG+ep k78S7rEsyvpEq4RH8U7Y21m+nkJGbn5qYSkdjdbgzYTBdZe8LIOwD/Y/r yZ10pqEMj21e3yJvzxOM8RSmxKKsoek3qlQltRSIAuaVWJmDmGKVcxc4I NTrl33j9RbKpgF4IrGgHFExuIjjKIL36v5ACXYRcHKgfWUNAl2gICCPBU qcjsdmMzMPpXZ03QK4YwH2R5SToMAMjkZcny6yYUsAWoEPfyoDM/P3WWX RPPW8atl4ns//PiuZwHsw5bdq8D57/1Br+UDs2arj3LkqZdzqiMbjoYeY w==;
IronPort-Data: A9a23:Gg1Mca0ZwLDwqugQCvbD5aFwkn2cJEfYwER7XKvMYLTBsI5bp2RRx mAcCGyCPPuJamrzKIojPN60oxtQ78DQzIRlHgNrqSg9HnlHl5HIVI+TRqvS04F+DeWYFR46s J9OAjXkBJppJpMJjk71atANlVEliefSAOKU5NfsYkhZXRVjRDoqlSVtkus4hp8AqdWiCmthg /uryyHkEALjimMc3l48sfrZ8ko35Kmq4Vv0g3RlDRx1lA6G/5UqJM9HTU2BByOQapVZGOe8W 9HCwNmRlo8O105wYj8Nuu+TnnwiGtY+DyDX4pZlc/HKbix5m8AH+v1T2Mw0Mh4L1mrTz7id/ /0W3XC4YV9B0qTkxrxBA0EAe810FfUuFLTveRBTvSEPpqFvnrSFL/hGVSkL0YMkFulfLkNpz /tAJAAxcBmpmcW4yYmEdc1pmZF2RCXrFNt3VnBI5wv/VMkAbKCbGuPU7thCxHE5ioZQB+3YI cEebFKDbjyZO1sWZQxRUc9l2rv47pX8W2QwRFa9vqow52zeygZ827vFLtfPe8eLSsMTlUGdz o7D1z2pXk1FbIPDodaD2iirxePRsX72Y5A9PeG+r91vrnmuxUVGXXX6UnP++5FVkHWWUtRTO mQU6jBosLNa3FamQdTtQzW5rWKK+BkGVLJ4HOQ+9gCL4qfQ4h2FFi4PSTspVTA9nMUsQ2U10 FKZx4qsHiJ19riUUjeX8fGetzXrfzYPNmlEbigBJecY3+TeTEgIpkqnZr5e/GSd17UZxRmYL +i2kRUD
IronPort-HdrOrdr: A9a23:6RZ8lqnIeA1M2Zwb3jpV2p6ut0XpDfLx3DAbv31ZSRFFG/Fw8P re+cjztCWE6gr5N0tBpTntAse9qBDnmqKdiLN5VYtKNzOW21dAQrsC0aLShxPtHCHk/vNQ2O NKY8FFZOHYPBxfgdzh6Ae1V/Qt0LC8mpyAtKP7w212RQ9nL5t86Rx0Yzz3LmRtSBJYCYECGJ 2Q28pCq1ObEkgqUg==
X-IronPort-AV: E=Sophos;i="5.95,159,1661817600"; d="scan'208";a="18447074"
Received: from BRN1WNEX02.vcorp.ad.vrsn.com (10.173.153.49) by BRN1WNEX01.vcorp.ad.vrsn.com (10.173.153.48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2375.31; Wed, 5 Oct 2022 10:01:12 -0400
Received: from BRN1WNEX02.vcorp.ad.vrsn.com ([10.173.153.49]) by BRN1WNEX02.vcorp.ad.vrsn.com ([10.173.153.49]) with mapi id 15.01.2375.031; Wed, 5 Oct 2022 10:01:12 -0400
From: "Hollenbeck, Scott" <shollenbeck@verisign.com>
To: "andy@hxr.us" <andy@hxr.us>, "regext@ietf.org" <regext@ietf.org>
CC: "galvin@elistx.com" <galvin@elistx.com>
Thread-Topic: [EXTERNAL] Re: [regext] WGLC: draft-ietf-regext-rdap-openid-17
Thread-Index: AQHY1yU82YkDxpBvXUOGv7F/jgroYa3+kj6AgAEkYSA=
Date: Wed, 05 Oct 2022 14:01:12 +0000
Message-ID: <a469164042a349308c40397d71c93b67@verisign.com>
References: <696A1066-D07F-4DCD-9894-9D7B8BDEAE38@elistx.com> <08EA70BF-CD18-484A-9458-9A61275C0E45@elistx.com> <CAAQiQRffOjYMOCjLunN-zQjb5SzpcNGbvdgDvxuivzft_P65jw@mail.gmail.com>
In-Reply-To: <CAAQiQRffOjYMOCjLunN-zQjb5SzpcNGbvdgDvxuivzft_P65jw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.170.148.18]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/regext/gKyQVYP1u3ne3eFvfTyZL9BvPs0>
Subject: Re: [regext] WGLC: draft-ietf-regext-rdap-openid-17
X-BeenThere: regext@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Registration Protocols Extensions <regext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/regext>, <mailto:regext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/regext/>
List-Post: <mailto:regext@ietf.org>
List-Help: <mailto:regext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/regext>, <mailto:regext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Oct 2022 14:01:18 -0000

Thanks for the feedback, Andy. More below...

> -----Original Message-----
> From: Andrew Newton <andy@hxr.us>
> Sent: Tuesday, October 4, 2022 10:37 AM
> To: REGEXT WG <regext@ietf.org>; Hollenbeck, Scott
> <shollenbeck@verisign.com>
> Cc: James Galvin <galvin@elistx.com>
> Subject: [EXTERNAL] Re: [regext] WGLC: draft-ietf-regext-rdap-openid-17
>
> Caution: This email originated from outside the organization. Do not click 
> links
> or open attachments unless you recognize the sender and know the content is
> safe.
>
> Scott (and the WG),
>
> My apologies for not taking the time to do a more read of this document
> earlier. Overall, I believe it to be good. And I believe it to cover the 
> range of
> features I have seen discussed in the various RDAP circles. Below you will 
> find
> my comments.
>
> Section 3.1.2 could benefit from a sequence or ladder diagram.

[SAH] OK, I'll see what I can come up with.

> In Sections 4.1.1 and Sections 4.1.2, there are TTLs for the session and 
> device.
> These are expressed in relative seconds, but from reading this I cannot
> determine the relation. Could or should these be absolute time values?

[SAH] They're provided by the IdP and relative to the start of the session. 
I'll make that clear in the text.

> In Section 4.2.1, is there a reason both forms of signaling the end user 
> identifier
> must be used? Can we just pick one? Or make one MANDATORY to support?
> From a security standpoint, it might be best to use the Authentication 
> header.

[SAH] They're both there as a matter of being liberal in what we'll accept 
from clients. Some clients, like a web browser, make it more difficult for a 
human user to provide an authorization header. The query parameter is much 
easier.

> In Section 4.2.3, a notice MUST be supplied with login successes and 
> failures. I
> think the notice should be a MAY and not a MUST as the client will know the
> success/failure based on the farv1_session.

[SAH] OK, agreed.

> Furthermore, the draft should probably give examples of what might be in
> those notices. Such as when login success, the notice may indicate any 
> limited
> scope of use, etc... and for failure, a more descriptive reason for the 
> failure.
>
> I have a similar concept for Section 4.2.4.1 as with Section 4.2.3.
> Furthermore, is it possible to signal a failure with a farv1_deviceInfo 
> structure?
> Otherwise, the client is left to determine the failure on the notice 
> structure,
> making the text a formal signaling mechanism. If the failure is indicated by 
> a
> lack of farv1_deviceInfo structure, that needs to be explicitly stated.

[SAH] Agreed again. I'd like to provide non-normative examples of success and 
failure notices and refer to the definition of the notice data structure in 
RFC 9083 for the details.

> For the Do Not Track feature in Section 4.3.2, it is unclear to me what a 
> server
> should respond with if the user requests farv1_dnt=true but the policy does 
> not
> allow it for that user. The draft says return a 501 Not Implemented, but a 
> 401
> or 403 seems more appropriate.

[SAH] Agreed, I'll change it to 403 since retrying won't make a difference.

> Section 4.4, 4.5, and 4.6, same comment about notices as section 4.2.3. I 
> guess I
> am a bit uneasy with free form text being used to signal success/failure.
>
> In Section 4.7, the server responds to unrecognized identification with a 
> 501. I
> think this should be 400, unless the server is required by policy to 
> understand
> the information.

[SAH] Agreed, 400 makes more sense.

Thanks again!

Scott