Re: [Txauth] Revisiting the photo sharing example (a driving use case for the creation of OAuth)

Dick Hardt <dick.hardt@gmail.com> Tue, 04 August 2020 17:31 UTC

Return-Path: <dick.hardt@gmail.com>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D33813A0DC8 for <txauth@ietfa.amsl.com>; Tue, 4 Aug 2020 10:31:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7fIenLHH4fFs for <txauth@ietfa.amsl.com>; Tue, 4 Aug 2020 10:31:29 -0700 (PDT)
Received: from mail-lj1-x22e.google.com (mail-lj1-x22e.google.com [IPv6:2a00:1450:4864:20::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E27143A0DC4 for <txauth@ietf.org>; Tue, 4 Aug 2020 10:31:28 -0700 (PDT)
Received: by mail-lj1-x22e.google.com with SMTP id t6so31576102ljk.9 for <txauth@ietf.org>; Tue, 04 Aug 2020 10:31:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FiPWdwnIrX79E5eiCzHNh2N8aSTZoUTj0fjEFZ5pK64=; b=P3RboxalD2A7MLAejgIBxDX0JpsUumVRXG+eCREQkfcVt/qr11m6NZK3KAy8PAYA6O lzS1lTSc/Lkiz9erWhowsSBf8jQHo4foB1wCXMXbWxwvmEI8QpKtX3d4DNFKYl4iv1PU +d2Qau9RJXPx+ywFUxcpQSDGaPupNCbKnrAnuCtejZcPa5TyNDvAME2VoH1aS2NIO2eH zF3oG5hHpEZnmR4oAPwaTnYBvge00pF+UUwXsBqigS6LwGiLnLnf5hbjpeONY1xz6PBh lRZ00iquDZzglQReUfQWgriYIdqo44KOn/B7bsRw/zU7KilCuq3EyElc2cbFRUB1R7Pc 6ihA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FiPWdwnIrX79E5eiCzHNh2N8aSTZoUTj0fjEFZ5pK64=; b=UOowcQtMfKVcmXrb0MZDpajna8uCUhFCueUjjFQw5E43wP1se3XjbzvinBAshKCm36 15h80PUoMWWpDm0RfnlFoQb1tkKR/2HKAOIPOQ9T3ayspBeClK9383SbfFXWbvPL1Nnp KwKuQGLWc3TcPuhdo+8J5C6DC4Tb31glZwOeAiPGEj+OxSGQzHYczcszjZtuYUFzP1za AX9i4DorA8IWO5ix3ZhG97Yzth1unajPNcMMyhtXXYAIcIHFOORwddYrkOonz71xdn9o HDJqBCO1Qw2sLkiyIq6sgFkj5Yb7Grx/w2GjUoUp2gIKm4B8ON0X16x0OW2g9cVtCKf2 +j/w==
X-Gm-Message-State: AOAM530h+9PqOynrWJvn179bqtDNlDqulup/h1IfMCxz07IzgvZFdrsl /dAJZg8UP4BykeRH/rF2vDqdk0SLU4wP84iCzKU=
X-Google-Smtp-Source: ABdhPJz1RiuY2euOS5Tpa3MyXA9NxllMEWzNAf37OuMEObRR49Yl72MPLK9sUC3hHnUcYkJr/CqjMRS9gMFllyShslk=
X-Received: by 2002:a2e:999a:: with SMTP id w26mr11058223lji.242.1596562286894; Tue, 04 Aug 2020 10:31:26 -0700 (PDT)
MIME-Version: 1.0
References: <c5f40413-93b8-2e8c-0a3e-14a07cd27ad0@free.fr> <ECF217AE-1D67-4EAE-AE51-531F6EE6E222@mit.edu> <CAK2Cwb5ANk75+Q8ca9+c+NMUrP-RRTgeGPn6Sj9W-K5HmO5uYw@mail.gmail.com> <2D519099-FF35-4D2C-95BE-A808B67F19B5@mit.edu>
In-Reply-To: <2D519099-FF35-4D2C-95BE-A808B67F19B5@mit.edu>
From: Dick Hardt <dick.hardt@gmail.com>
Date: Tue, 04 Aug 2020 10:30:50 -0700
Message-ID: <CAD9ie-tcFZtaGdPUAVR0ZrryzVrMBBWQugeeELWLvc7Ya1ZNjw@mail.gmail.com>
To: Justin Richer <jricher@mit.edu>
Cc: Tom Jones <thomasclinganjones@gmail.com>, Denis <denis.ietf@free.fr>, "txauth@ietf.org" <txauth@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000f8e35d05ac109f05"
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/GTCAEHTlN3Rtj3S52_tIJHrMpqg>
Subject: Re: [Txauth] Revisiting the photo sharing example (a driving use case for the creation of OAuth)
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2020 17:31:32 -0000

+1 to Client and RS being the roles they are playing in the protocol.
ᐧ

On Tue, Aug 4, 2020 at 8:51 AM Justin Richer <jricher@mit.edu> wrote:

> That’s exactly why “client” and “RS” need to be thought of as a “role” and
> not an “entity”. An entity can have several roles, and they’re all about
> context.
>
> The “client” role is always the “client” regardless of whether the entity
> being the “client” can also be an “RS” in another context milliseconds
> later.
>
>  — Justin
>
> On Aug 3, 2020, at 5:16 PM, Tom Jones <thomasclinganjones@gmail.com>
> wrote:
>
> In our use cases the client and rs are indistinguishable other than one is
> a source and the other a sink of data. They can reverse roles rapidly. I
> agree that client is not a helpful name.
> Peace ..tom
>
>
> On Mon, Aug 3, 2020 at 12:02 PM Justin Richer <jricher@mit.edu> wrote:
>
>> Hi Denis,
>>
>> I think there’s still a problem with the terminology in use here. What
>> you describe as RS2, which might in fact be an RS unto itself, is a
>> “Client” in OAuth parlance because it is *a client of RS1*. What you
>> call a “client” has no analogue in the OAuth world, but it is not at all
>> the same as an OAuth client. I appreciate your mapping of the entities
>> below, but it makes it difficult to hold a discussion if we aren’t using
>> the same terms.
>>
>> The good news is that this isn’t OAuth, and as a new WG we can define our
>> own terms. The bad news is that this is really hard to do.
>>
>> In GNAP, we shouldn’t just re-use existing terms with new definitions,
>> but we’ve got a chance to be more precise with how we define things. This
>> could mean splitting up things into multiple roles, or defining new roles
>> for aspects that weren’t in consideration in the protocol previously.
>> Perhaps what you’re calling a client below could potentially be considered
>> the “interaction component” or “consent gatherer”, which was previously a
>> portion of the AS.
>>
>> I’ve never been a fan of the term “client” in OAuth because it’s too
>> generic and confusing to a lot of developers, especially the web
>> programmers that OAuth is aimed at. “User Agent” would be similarly
>> unsuitable for the same reasons — both “client” and “user agent” are taken
>> to mean “browser” in many circles. I’d love for us to come up with a new
>> term for this, but apart from the “Resource Client (RC)” that I proposed in
>> the XYZ Draft, I don’t have an answer.
>>
>>  — Justin
>>
>> On Aug 3, 2020, at 3:35 AM, Denis <denis.ietf@free.fr> wrote:
>>
>> Hello Dick,
>>
>> This is a follow-up of the thread: "Reviewing
>> draft-hardt-xauth-protocol-11".
>>
>> Hereafter are three exchanges between you and me which triggered this new
>> thread:
>>
>> [Dick]    The photo sharing example was a driving use case for the
>> creation of OAuth.
>> [Denis]  We would need to revisit the original scenario and consider if
>> it can be addressed in a different way than the original way.
>> [Dick]   The use case is the same. Is there a different solution you are
>> proposing ?
>>
>> My response is : Yes indeed, I have a different solution to address the
>> same use case.
>>
>> RFC 6749 and draft-ietf-oauth-v2-1-00 both state:
>>
>> For example, an end-user (resource owner) can grant a printing service
>> (client) access to her protected photos stored at
>> a photo-sharing service (resource server), without sharing her username
>> and password with the printing service. Instead,
>> she authenticates directly with a server trusted by the photo-sharing
>> service (authorization server), which issues the printing
>> service delegation-specific credentials (access token).
>>
>> There are no further explanations.
>>
>> Which information will be disclosed by the resource owner to the
>> authorization server to get "the printing service delegation-specific
>> credentials"
>> is not described. It is a private agreement between the AS and the RS. It
>> is more than likely that the authorization server will learn information
>> about which operation the resource owner is wishing to perform and where.
>> Since in OAuth, the access token is supposed to be opaque to the Client,
>> the user will be unable to make sure that her instructions have been
>> carefully followed.
>>
>> RFC 6749 and draft-ietf-oauth-v2-1-00 both share a common point: they do
>> not contain a "Privacy Considerations" section.
>> Thus, the leakage of information to the AS is not discussed.
>>
>> It is possible to revisit the original scenario by applying "Privacy by
>> design" principles.
>>
>> The scenario can be solved by using an old data transfer method that has
>> been first described 32 years ago under the name
>> "Referenced Data Transfer (RDT)" in ECMA-131 (1988) and a few years later
>> in ISO/IEC 10740-2:1993.
>>
>> RDT allows two servers to directly exchange large amounts of data under
>> the supervision of a client by communicating, through the client,
>> a reference generated by one server to the other server. RDT does not use
>> any Authorization Server (AS). This means that no AS is able
>> to act as Big Brother and this solves a major privacy concern.
>>
>>
>> * The three entities involved *
>> The Client supporting a User (was the Resource Owner).
>> The Photo-sharing service (was the Resource Server) : RS1.
>> The Printing service (was the client): RS2.
>>
>>
>>
>> *Flow of operations with the Photo-sharing service (RS1) *The Client
>> first connects to the photo-sharing service (RS1) and the User
>> authenticates to the photo-sharing service (RS1).
>>
>> RS1 to User: "Please select the operation to be performed".
>> Operation selected: "Print pictures using a third party printing service".
>>
>> RS1 to User: "Please select a set of pictures to be printed".
>> The User selects the pictures.
>>
>> RS 1 User consent: "Do you agree RS1 to communicate your selection of
>> pictures to a third party printing service" ?
>> If the User consents, RS1 to Client: "Here is the reference to be used by
>> your printing service to get the selected pictures".
>>
>> * Flow of operations with the Printing service* (
>> *RS2) *
>> The Client connects to the printing service (RS2) and the User
>> authenticates to the printing service (RS2).
>>
>>             *Note*: This allows to make sure that the user has an
>> account on RS2 so that further operations can be charged to this account
>>                       and that the prints can be sent to a known address.
>>
>> RS2 to User: "Please select the operation to be performed".
>> Operation : "Print pictures to be received from a photo-sharing service ".
>> RS2 to User: "Please indicate your photo-sharing service"..
>> The User responds: RS1.
>>
>> "Please enter the reference to be used by RS2 to receive the set of
>> pictures from RS1".
>> The Client (or the User) enters the reference generated by RS1.
>>
>> RS2 contacts RS1 using that reference in order to get the characteristics
>> and the thumbnails of the pictures to be printed (i.e. not yet the whole
>> pictures).
>>
>> RS2 to client: What are your printing preferences for each picture (e.g.
>> number of prints, size, quality of the paper, resolution, margins, colours,
>> etc... ) ?
>> The User responds to all these questions.
>>
>> RS 2 User consent: This operation will be charged XX € ? Do you agree ?
>> If the payment needs to be done on-line, then a payment phase is inserted.
>>
>>
>>
>> * Continuation of the flow of operations *Final message from RS1 to the
>> Client: "Your selection of pictures will be soon transmitted to RS2".
>> Final message from RS2 to the Client: "Your prints will be soon on their
>> way".
>>
>> RS2 to RS1 (asynchronous): transmit the set of pictures corresponding to
>> this reference.
>>
>> * Some of the advantages of RDT*
>>
>>    1. An end-user can grant a printing service (RS2) access to her
>>    protected photos stored at a photo-sharing service (RS1),
>>    without sharing her username and password with the printing service.
>>    2. Neither RS1, nor RS2 need to use or to trust any AS. This solves
>>    the Big Brother privacy issue.
>>    3. Any authentication method supported by RS1 or RS2 can be used by
>>    the User.
>>    4. The User can use any photo-sharing service (RS1) with any printing
>>    service (RS2), as long as they both support RDT.
>>    5. The User consent is first performed with the photo-sharing service
>>    (RS1) and then after with the printing service (RS2).
>>    6. The reference generated by RS1 will only be accepted by RS1 during
>>    a time period.
>>    7. The reference generated by RS1 allows RS2 to query first the
>>    thumbnails and then after the pictures selected by the User at RS1.
>>    8. The data transfer of the pictures selected at RS1 by the User is
>>    performed asynchronously from RS1 to RS2 as a back-office operation.
>>
>> *Questions*: What would be the full scenario of this use case using
>> OAuth ? What about Privacy Considerations ?
>>
>> Denis
>>
>> --
>> Txauth mailing list
>> Txauth@ietf.org
>> https://www.ietf.org/mailman/listinfo/txauth
>>
>>
>> --
>> Txauth mailing list
>> Txauth@ietf.org
>> https://www.ietf.org/mailman/listinfo/txauth
>>
> --
> Txauth mailing list
> Txauth@ietf.org
> https://www.ietf.org/mailman/listinfo/txauth
>
>
>