Re: [Txauth] Call for charter consensus - TxAuth WG

Fabien Imbault <fabien.imbault@gmail.com> Wed, 11 March 2020 09:50 UTC

Return-Path: <fabien.imbault@gmail.com>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1B793A160B for <txauth@ietfa.amsl.com>; Wed, 11 Mar 2020 02:50:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.099
X-Spam-Level:
X-Spam-Status: No, score=-0.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, PDS_OTHER_BAD_TLD=1.998, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rb5AQyJcIeC0 for <txauth@ietfa.amsl.com>; Wed, 11 Mar 2020 02:50:05 -0700 (PDT)
Received: from mail-ot1-x32e.google.com (mail-ot1-x32e.google.com [IPv6:2607:f8b0:4864:20::32e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2E393A1623 for <txauth@ietf.org>; Wed, 11 Mar 2020 02:50:04 -0700 (PDT)
Received: by mail-ot1-x32e.google.com with SMTP id f21so1241558otp.12 for <txauth@ietf.org>; Wed, 11 Mar 2020 02:50:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=4NGIVc1bLn4RgPX5tg1K4HsLyDOfp/9a7G1kLZUlCTQ=; b=oYQVlxyS3fUJDlqGFmwlqcU2Tw//penf0Hl4NM7ivFuw/5TD1fgWDpn7H3AfarM3Oh lvB4sK7Aop5Upah1dNuVo8IH2fF5IhNYKdZf1MaJ7Sm327+C2/T8twSwY8/jIMr03njG 5jTEYYhtyIvACywVn87iUsh0XnRO0iuHJk3snIN0cbinXGk55iV+/WOcbzmCOAaM1tdp nQWBYvV+mZ1VzpOAStMW1iamFLFtoJkf3mCeWaRN+LxtuJdfGXHoTlHb7Xr1ru75ilZd Zz3y9aGrBczlqNvukvymJID7drGWGlnEeBo1MDMZ/IkQ6/F2ox8oopPlDq2ZYBlqkbmq +qlQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=4NGIVc1bLn4RgPX5tg1K4HsLyDOfp/9a7G1kLZUlCTQ=; b=eNKVHaBa+N4KTQeMmX6cmJItFY6WKsm0kfnelTZ5yVozmaA/WWm9U/d6xdIdso4xI2 WmywayOIKeurXbUWVAxqQWxSArKI1X1fMib5pxyCguxWITET3sUNw80pANRiBmunz2nw +cLfJZc0YkR0G2F6eK5u5dODHgFWRGKSzfjP2lIg7DDaTerRjsBKPocSQ4bivJlpA4YX HfgnycQvytUr9+LfcLhGECjDjVzutXxZ86vLG9t8IBY0QvCIkce0OrHEbmimLrgQoOgZ L3U5GTV9SByEQSRCY3hFb9eOKu/Ur/oghQfuD76ndSjYh4hZWwWfPXW3F2UP8oCsdwRk VAkA==
X-Gm-Message-State: ANhLgQ0ax4dtetxuGSIMBeDEtrC2kWIs2NkUTr/3f1qsPXKxpuAbU3gu 4KIKkE9siTTy/VTk6ootTd+7Ve1oKLMBeKqkxo4BGNCMUAk=
X-Google-Smtp-Source: ADFU+vtcSOeCtBiddIPCpUsOcQIQdQgK1iQw/0mW013dOnzDuhIGKXTOwT4dfgRLe0ZdqcBkxNJjVKMsdeLAVMPuP/k=
X-Received: by 2002:a05:6830:19e2:: with SMTP id t2mr1549951ott.97.1583920203748; Wed, 11 Mar 2020 02:50:03 -0700 (PDT)
MIME-Version: 1.0
From: Fabien Imbault <fabien.imbault@gmail.com>
Date: Wed, 11 Mar 2020 10:49:52 +0100
Message-ID: <CAM8feuQg1H8MPn_3ycy+n19T+G=nY6dwaY8qygPxyjhg2s6zKA@mail.gmail.com>
To: txauth@ietf.org
Content-Type: multipart/alternative; boundary="00000000000018dbc505a0912990"
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/8YtiMFdOnZgt550bIQOfTg2mjqc>
Subject: Re: [Txauth] Call for charter consensus - TxAuth WG
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Mar 2020 09:50:15 -0000

Hello,

Thanks for the work being done. I'm new to IETF (but have worked in the
past with other collaborative orgs) so please forgive any unusual habits if
any, will try to catch up.

> 1.  Do you support the charter text provided at the end of this email?
Or do you have major objections, blocking concerns or feedback (if so
please elaborate)?

Yes, with comments.

I believe the last part of the charter : "will strive to enable simple
mapping to other protocols such as COAP when doing so does not
conflict with the primary focus" should be modified, to acknowledge
what is really in the scope and what is not. As it is written, I
actually don't know very well.

Certainly the main goal is HTTP support and that is already a large
challenge which needs to be handled with priority.

However we need to acknowledge contrained devices are now very common,
people want to manage them properly but usually those devices don't
speak well over HTTP. From the content available on oauth.xyz, I have
the impression that the use case is in the scope. That makes also be a
great differentiation compared to OAuth2, and one doesn't have to
fight so much with change management as the field is much newer,
compared to webapps. In the IoT domain, that would be very useful
because implementing delegation at scale is a real/unsolved issue.

But as the charter is currently written, it is unclear what "simple
mapping" really means and whether that could work out in practice as
an after thought. I also have the feeling that saying the mapping to
other protocols should not conflict with the primary focus doesn't
make it so much clearer on what is exactly expected.

Supporting a variety of IoT protocols is obviously out of question. So
I suggest we get back to the requirements, and would propose the
following: the protocol shall be usable by constrained devices,
provided they can discuss over an IP network such as CoAP (see the
work on OAuth2 ACE for instance), SCHC (which is also an upcoming IETF
RFC) or other future protocols that would allow the interface to match
with HTTP behaviour (through an adaptor). For those types of clients,
the communication stack (supported and/or prefered) could be declared
in a pre-register phase.

What would still be out of scope is to design network protocol
independance within TXAUTH. For instance, stateful data centric
protocols such as MQTT would be out of scope.

My team and myself are available to work on this (both on spec and
opensource implementation prototype), and make constrained devices a
first class citizen, if you agree that's indeed a common need. Of
course, I do not intend this to be the priority, but more as a way to
take feedback and make sure the protocol's design doesn't forbid such
demands, likely to become mainstream.

Please let me know what you think.


> 2.  Are you willing to author or participate in the development of the
drafts of this WG?

Yes.

> 3.  Are you willing to help review the drafts of this WG?

Yes.

> 4.  Are you interested in implementing drafts of this WG?

Yes, rust implementation (and webassembly bindings).

Best regards,

Fabien