Re: [GNAP] Resource Servers draft

Fabien Imbault <fabien.imbault@gmail.com> Mon, 10 May 2021 07:27 UTC

Return-Path: <fabien.imbault@gmail.com>
X-Original-To: txauth@ietfa.amsl.com
Delivered-To: txauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A30F3A0AEE for <txauth@ietfa.amsl.com>; Mon, 10 May 2021 00:27:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hwhBEFWYw5SK for <txauth@ietfa.amsl.com>; Mon, 10 May 2021 00:27:24 -0700 (PDT)
Received: from mail-il1-x130.google.com (mail-il1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3494E3A0AF3 for <txauth@ietf.org>; Mon, 10 May 2021 00:27:24 -0700 (PDT)
Received: by mail-il1-x130.google.com with SMTP id m7so3886510ilg.9 for <txauth@ietf.org>; Mon, 10 May 2021 00:27:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=R2yJPS81GA0A3L5Ly3FCvYqG39gvG61lJyLQvb4rum4=; b=aO8bZZz8xhPDNnNyHg4lbT6b7JuZGL2ZJXBxjmzsrf71McsoolzEFnH/N/AAOcqONB aEPyn5g0SFWb1sEqtRUKL1hU+3SzphJ1gSBYikxWpiV+iLArT6LMjWdOx2yt71r4oHwc 4jWrxb1L8kKHspmcQW+uU8ad1PBiTNGWd7P0yDolX7JlFODbPx8JHfI9Ip/XictWZ+YU x/8ZKTE9x/BUBiuR0eA3cdk2XtoU7frsmFnhnBUhaZw8Z3/vbkEsvrm+LWVNQl/UH1YS Ds67XXLS8kvvtrzXFCUEckM2FEUKT2VEOJbeYPSnin3Ugdf9BOZQ9Ju2FHBX8rjk94T8 4bwQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=R2yJPS81GA0A3L5Ly3FCvYqG39gvG61lJyLQvb4rum4=; b=X2qy7HDABypGhGKEn0X567idf4KI5CIaTyl3ORf3jR7Pc6faPiHbYKDGOSWu+0oIXw 7YBVvDjfKXjL1locRzuFm2qpVJya5LTStgpLtr7A1AK66mMGdQ3A7bwjiA3QbSJUTvAi dMllRN5vYJVF9Fp23H34U9jbYNEd82+pCpTq9yl6Cp5nCyFg4cc1H5pXH1zhmnFp/ohG 1v4RUighT1JTE79ef/58tLUrJ0qWUnXS6DaFu+CwgYQKlaNQqDS9eAF32TVmkrHC6j/9 MWKibVMWygghrPVlUkUwPGmAonfdI3orPa2q+i4sdqxV6KqWpuGn4T5iALr8E2sgUdcc QTaA==
X-Gm-Message-State: AOAM533ukWCkV2T9GOo1gNksXIHccw/KqPNQfmpqZbAoExtPis23zbpl arMMe5uU7vBV7roUflzkZDqN19NM2vRWiE9wJOA=
X-Google-Smtp-Source: ABdhPJwdGgD/qjCFW5qtAlEmOPB4R2lCfsJe3ocvyxWOVwOnHBosLWyjfZrtXseGFBaPuRBIf9QipYRUG0UglG8qTKc=
X-Received: by 2002:a05:6e02:1708:: with SMTP id u8mr21141460ill.188.1620631642635; Mon, 10 May 2021 00:27:22 -0700 (PDT)
MIME-Version: 1.0
References: <8517AD16-92CD-7743-92CC-D8ABC4DAAEC9@hxcore.ol> <CAM8feuRa8wJdwSpz6JhUfdmPyoafj0N7aXxQWtPuAna2hfHHOg@mail.gmail.com> <CANYRo8gM6fk4VSn=_vC16TcH+GPbs6gLUGBipfcab5oOXzdCdA@mail.gmail.com> <CAM8feuTWE4q3S-uuoYGUNk48Kv54GLhrfUbWfvXGQmwwiDcnTA@mail.gmail.com> <CANYRo8hL5o+ZyRTBHaxpar+TJGqzLwStGXMWTMsFKVSOiq=zKA@mail.gmail.com>
In-Reply-To: <CANYRo8hL5o+ZyRTBHaxpar+TJGqzLwStGXMWTMsFKVSOiq=zKA@mail.gmail.com>
From: Fabien Imbault <fabien.imbault@gmail.com>
Date: Mon, 10 May 2021 09:27:11 +0200
Message-ID: <CAM8feuTHqR7vjziw5a2DR=BeE96hpGqhxXaufwS4rnuzVuskyg@mail.gmail.com>
To: Adrian Gropper <agropper@healthurl.com>
Cc: GNAP Mailing List <txauth@ietf.org>, Yaron Sheffer <yaronf.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="0000000000005f013805c1f4b563"
Archived-At: <https://mailarchive.ietf.org/arch/msg/txauth/SuyS1Vix_dmjCX2MlaGCpwHzLh8>
Subject: Re: [GNAP] Resource Servers draft
X-BeenThere: txauth@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: GNAP <txauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/txauth>, <mailto:txauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/txauth/>
List-Post: <mailto:txauth@ietf.org>
List-Help: <mailto:txauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/txauth>, <mailto:txauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 May 2021 07:27:29 -0000

Yes, for DIDs it makes sense as it's very established now.
But capability tokens don't have that chance yet, so a registry seems to me
like a better idea, especially if they require that kind of extra
dependency. None of them have been defined as an RFC yet. I could propose
to do the work for biscuits, together with the good folks of CleverCloud.

Fabien

On Mon, May 10, 2021 at 9:17 AM Adrian Gropper <agropper@healthurl.com>
wrote:

> I agree with not making LD a dependency but the SSI folks are in love so
> it’s nice to respect that.
>
> Adrian
>
> On Mon, May 10, 2021 at 3:04 AM Fabien Imbault <fabien.imbault@gmail.com>
> wrote:
>
>> Yes, seems a good place for an extension registry. The most important is
>> that we can support both simple tokens (jwt or equivalent, ex paseto) as
>> well a capability tokens (biscuit, macaroon, zcap-ld), and define what's
>> commonly supported. Yet it seems easier to keep to the rule of not
>> including linked data as a dependency in the main documents (but that's a
>> personal opinion).
>>
>> Fabien
>>
>> Le dim. 9 mai 2021 à 20:53, Adrian Gropper <agropper@healthurl.com> a
>> écrit :
>>
>>> macaroons, biscuits, and ZCAP-LD
>>>
>>> - Adrian
>>>
>>> On Sun, May 9, 2021 at 2:34 PM Fabien Imbault <fabien.imbault@gmail.com>
>>> wrote:
>>>
>>>> Hi Yaron,
>>>>
>>>> A comment on access token formats: I don't think we should define our
>>>> own format, but we can reference other documents such as
>>>> https://datatracker.ietf.org/doc/html/draft-bertocci-oauth-access-token-jwt
>>>> and the references to macaroons, biscuits.
>>>>
>>>> The rest I believe makes good issues, most of which should be quick to
>>>> fix.
>>>>
>>>> Cheers
>>>> Fabien
>>>>
>>>> On Sun, May 9, 2021 at 4:00 PM Yaron Sheffer <yaronf.ietf@gmail.com>
>>>> wrote:
>>>>
>>>>> Hi Editors,
>>>>>
>>>>>
>>>>>
>>>>> Here’s a bunch of comments to the latest version (Editor’s Draft as of
>>>>> today). Please respond with what is easy to fix, and what I should open an
>>>>> issue for.
>>>>>
>>>>>
>>>>>
>>>>> Thanks,
>>>>>
>>>>>                 Yaron
>>>>>
>>>>>
>>>>>
>>>>>    - Abstract: better use more concrete terms than "piece of
>>>>>    software". Even if this creates a dependency on the Terminology section.
>>>>>    - Typo: by (AS).
>>>>>    - "client-facing discovery mechanism" - I'm not seeing any
>>>>>    client-facing protocol in the document (and it wouldn't belong here anyway).
>>>>>    - Terminology: include a reference to the Terminology section of
>>>>>    the Core doc.
>>>>>    - Access Token Formats: IMO we should specify a minimal, generic
>>>>>    format in an appendix, as a non-normative starting point for developers. It
>>>>>    would be better than having each implementation make its own mistakes.
>>>>>    - Macaroons, biscuits, other baked goods: add a reference.
>>>>>    - AS Discovery: why do we need a "well known" URI? Either we use
>>>>>    GNAP Core to pass the AS address to the RS, and then we could pass a full
>>>>>    URI, or we don't, and then how does the RS even know how to find the AS?
>>>>>    - Protecting RS requests to the AS: the RS, by definition, owns
>>>>>    resources. This means that it needs to have a persistent identity, in
>>>>>    addition to the (ephemeral) keys being presented. Otherwise (especially
>>>>>    with TOFU registration) we could easily have Resource Servers squatting on
>>>>>    other people’s resources. It is very hard to manage the mapping of RS to
>>>>>    resources if we don't have such a persistent identity.
>>>>>    - Token Introspection: it is not clear to what depth we are
>>>>>    defining the API: is it only the existence of the "introspect" endpoint? Or
>>>>>    do we define a minimal set of standard attributes that need to be returned?
>>>>>    The API would not be useful for interoperability unless we define some of
>>>>>    the returned attributes. At the very least: "active".
>>>>>    - "client instance's request" - should be "Resource Server's
>>>>>    request".
>>>>>    - And we should add: the AS MUST validate that the token is
>>>>>    appropriate for the RS that presented it, and return an error otherwise.
>>>>>    - Typo: internal link to "token format".
>>>>>    - IANA Considerations: the "well known" URL should be registered
>>>>>    (BTW, it's a well-known *URI*). Also, please list the registries that we
>>>>>    need to establish.
>>>>>
>>>>> --
>>>>> TXAuth mailing list
>>>>> TXAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/txauth
>>>>>
>>>> --
>>>> TXAuth mailing list
>>>> TXAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/txauth
>>>>
>>>