Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-02.txt

Paul Kyzivat <pkyzivat@alum.mit.edu> Thu, 11 July 2019 13:46 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF44E120224 for <sipcore@ietfa.amsl.com>; Thu, 11 Jul 2019 06:46:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KSdSv6kb-ERb for <sipcore@ietfa.amsl.com>; Thu, 11 Jul 2019 06:46:05 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F52B120077 for <sipcore@ietf.org>; Thu, 11 Jul 2019 06:46:04 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x6BDk2lE026384 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for <sipcore@ietf.org>; Thu, 11 Jul 2019 09:46:03 -0400
To: sipcore@ietf.org
References: <156249821133.14592.1211919336596009446@ietfa.amsl.com> <68ed93ae-57df-6bc7-774b-47959417abda@alum.mit.edu> <HE1PR07MB3161D46B4A44FC7E789ADDB893F10@HE1PR07MB3161.eurprd07.prod.outlook.com> <4a9787e5-b5e2-bc08-0fa0-fae6bd44148d@alum.mit.edu> <527F4C39-F065-4335-A939-6D443F1801E7@ericsson.com> <5bb63c0c-130d-7f69-10b0-1ed1b274cc58@alum.mit.edu> <87AD4BB8-CE77-4FD7-BB72-6643DF513058@ericsson.com> <168b1354-b35b-edee-e5f9-d4ddbecfae40@alum.mit.edu> <607A513F-8616-4777-8B5E-59390E845709@ericsson.com> <b6ca4c79-5a17-10da-3882-20bc8b0e9b98@alum.mit.edu> <5ABB2F7B-8928-4581-8AAD-C8EFDBE95F7E@edvina.net> <99649808-9894-42B4-ADD1-52D0F70A3FB3@ericsson.com> <BCFE43BD-86FF-457E-9006-1DA7C8F3F6BE@edvina.net> <C3BFE2FE-0797-4E54-BAD4-B24E32CB183F@ericsson.com> <BD0B9B14-1E35-42C4-BF51-430C7E052145@edvina.net> <C5597D63-1B58-44D0-A2CE-4170CC1BE23E@ericsson.com> <7CE54346-6558-4605-A5DB-84C539400A19@edvina.net>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <56f4ed60-15b7-5bbe-63a5-10f447ae9094@alum.mit.edu>
Date: Thu, 11 Jul 2019 09:46:02 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.7.2
MIME-Version: 1.0
In-Reply-To: <7CE54346-6558-4605-A5DB-84C539400A19@edvina.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/DU53gjRCTNTOhxxUt0NPdhxCtho>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-02.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jul 2019 13:46:13 -0000

This discussion is wandering in many directions. I don't know very much 
(anything?) about OAuth so it is pretty abstract for me. But what is 
becoming clear is that the people discussing this have *many* unstated 
assumptions about how this is to work and how it is to be used. And 
those don't appear to be well aligned with one another.

I've been pushing for more of these assumptions (and implications) to be 
written down in the document. I still want that. But I'm beginning to 
think that the issue is bigger than what is likely to fit into this 
document as it is currently conceived.

I think what may be needed is a framework document. (Perhaps "Framework 
for using OAuth(2?) with SIP", though maybe that isn't quite right. This 
would discuss why this is important, how it relates to the sip 
environment, how it fits into a broader authentication environment, etc.

	Thanks,
	Paul

On 7/11/19 7:49 AM, Olle E. Johansson wrote:
> 
> 
>> On 11 Jul 2019, at 13:25, Christer Holmberg <christer.holmberg@ericsson.com> wrote:
>>
>> Hi,
>>
>>>>>>> The tokens generally, but if I understand it right not always, are JWT structures that contain various data. In
>>>>>>> OpenID connect both the access and identity token are JWTs.
>>>>>>> We can either specify specific claims that  are standardised for various SIP functions or let that be open for
>>>>>>> the SIP implementors to specify or a combination.
>>>>>>
>>>>>> For backward compatibility, we should at least let SIP implementors specify
>>>>> Maybe, but at least we should write something about the usage of claims and scopes.
>>>>> I think a base level for this draft is specifying a way to say “this access token is valid for SIP usage” or
>>>>> “this is also a SIP identity"
>>>>
>>>>    Perhaps we can add some text about scope and claims, but I don't want to mandate usage of specific values, because that
>>>>    may not be backward compatible with existing implementations using JWT.
>>>
>>> We can mandate *if* the access token is a jwt (and there’s an identity token like OpenID Connect).
>>
>>     It may not work with existing implementations that DO use JWT access tokens (not sure whether they use OpenID Connect, though).
> 
> Ok, you are making me interested - what are these implementations?
> When writing a new standard document, should we really be blocked by pre-standard implementations? I would assume that we
> should be inspired by them, learn by their experiences, but not be hindered by them.
> 
>>
>>>> I see interoperability problems if every implementation is using different data structures for stuff like SIP AOR, SIP usage claim
>>>> and maybe a few more that we will come up with as we continue working. Standardizing some of these basic data points in tokens will help interoperability.
>>>
>>> If the access token is a random blob we don’t require any change.
>>>
>>> In addition I think we should change the “sip.token” label to something more specific like “sip.oauth2”.
>>
>>     I think it was me who suggested to use sip.token, but I don't have a strong opinion about it. It was added recently, so existing implementations currently don't use it anyway.
> 
> We have already been confused by discussions about “the token” when in fact there are multiple tokens…
> 
> /O
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>