[Wimse] Re: [EXTERNAL] Re: Request for Input: Best Current Practice for OAuth 2.0 Client Authentication in Workload Environments
Arndt Schwenkschuster <arndts@microsoft.com> Tue, 30 July 2024 10:04 UTC
Return-Path: <arndts@microsoft.com>
X-Original-To: wimse@ietfa.amsl.com
Delivered-To: wimse@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4204C14F6FC for <wimse@ietfa.amsl.com>; Tue, 30 Jul 2024 03:04:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.254
X-Spam-Level:
X-Spam-Status: No, score=-2.254 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8xRGRLALKCiQ for <wimse@ietfa.amsl.com>; Tue, 30 Jul 2024 03:04:11 -0700 (PDT)
Received: from EUR02-AM0-obe.outbound.protection.outlook.com (mail-am0eur02on2106.outbound.protection.outlook.com [40.107.247.106]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87AA4C14F6EE for <wimse@ietf.org>; Tue, 30 Jul 2024 03:04:11 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=n2b1uxa1ZmsX2H+q2xnSj5Ornk1zp8j61oHSyFZcG75EIhvYzbDqlAiHJ9iSJTkoiHvh1F8MKKOHbjHtavRkTVWtyv1ID0eNAX6sfNTyOGY5x4kRSq1mnopyK82IlqYyNY2G6CYkIWpihqMHQJHkfcmrUnlPVwfMxDLtio08gKKZD5rxyOrZklztsYaOGl8HBKZcBRa5Yrzy03QEae8hkqI6gZKJ1P7JXqWCaWhRCZZQco+0B2ZJPhKXrEih3gx9Xz3nvNGnPK3TidOtpvdjpEmzNpuBrJUWW48C0ojFZfP2xcM2ts5hJTSaGhD4tA0Y5BLl1ZzCC4aT8aRhUkLzxA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YE4hpeJgOyDRfEoWcOIutZTb1ZEOBvS/tS1j6lZPkG8=; b=MESjra/H4aaFAwaqO+vUd+oodBorcSsIvA6hnR8tKsX9VsDcsnOqb7s1IC/qHpDr5Q1LMs0ddnJD5oojKlhnw6+TfBpj2+Wv2jQNyP/EykyKVlpxaVm/SV+F1mz9EexALN2ZjBp5ucWVXeXuDVrS/peYPXOc+QW+pATVvO3kniflt2lKJk3LinbG7lE0YGXtQ3vpq8r38/Gf6MmYAuHhOb+1gwAlOW6OK6JbIJ3mgdjGmjxxI8igEzw1yhNRKh5vnlVFQGuctn/f99qJnOwHeS6zBYKelDTWBTgmTD0d3lnXNNt5FmuszS/JaQLaAUvPSfa9rWvuAgEDagmtXGe5Mw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YE4hpeJgOyDRfEoWcOIutZTb1ZEOBvS/tS1j6lZPkG8=; b=OWikAelNuor08ELrOPQWCQZz91Zt7WpirseuFgJgZpSqD7MrCB5qNVxXGQf/pouHo2JsA2PRsxvzQZv7wgpa2e92qo5fz1iptPQXBi3JdhcUO3Zj9vhGfWkyptE9fuumgF37jBEH4FE0li4uFJg5ohomKp2kwHg0H/2RXRbIdLI=
Received: from GVXPR83MB0581.EURPRD83.prod.outlook.com (2603:10a6:150:15b::15) by VI2PR83MB0766.EURPRD83.prod.outlook.com (2603:10a6:800:280::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7807.7; Tue, 30 Jul 2024 10:04:07 +0000
Received: from GVXPR83MB0581.EURPRD83.prod.outlook.com ([fe80::5977:c625:f66a:1a3b]) by GVXPR83MB0581.EURPRD83.prod.outlook.com ([fe80::5977:c625:f66a:1a3b%7]) with mapi id 15.20.7807.005; Tue, 30 Jul 2024 10:04:07 +0000
From: Arndt Schwenkschuster <arndts@microsoft.com>
To: Andrii Deinega <andrii.deinega@gmail.com>, "Flemming Andreasen (fandreas)" <fandreas=40cisco.com@dmarc.ietf.org>
Thread-Topic: [EXTERNAL] [Wimse] Re: Request for Input: Best Current Practice for OAuth 2.0 Client Authentication in Workload Environments
Thread-Index: AdrhoMjopmD8yk6CTG2adWt4Qe20MQAZEn0AAAFlVAAAFu+16A==
Date: Tue, 30 Jul 2024 10:03:58 +0000
Message-ID: <GVXPR83MB05811B457E576D2AF8AFB969DFB02@GVXPR83MB0581.EURPRD83.prod.outlook.com>
References: <DBAPR83MB0437B6623ED287A218D1FE4F91B72@DBAPR83MB0437.EURPRD83.prod.outlook.com> <7c7c2092-a806-4f28-a37b-f3556b9858a5@cisco.com> <CALkShctBATK+KknNNtvDP_Yti5tH2omYKv9JQqSjAhEte95LcQ@mail.gmail.com>
In-Reply-To: <CALkShctBATK+KknNNtvDP_Yti5tH2omYKv9JQqSjAhEte95LcQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2024-07-30T09:54:00.1169173Z;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0;MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GVXPR83MB0581:EE_|VI2PR83MB0766:EE_
x-ms-office365-filtering-correlation-id: a934e7ca-747f-4695-de4d-08dcb07ef30f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|4022899009|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GVXPR83MB0581.EURPRD83.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(4022899009)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GVXPR83MB05811B457E576D2AF8AFB969DFB02GVXPR83MB0581EURP_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GVXPR83MB0581.EURPRD83.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a934e7ca-747f-4695-de4d-08dcb07ef30f
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jul 2024 10:04:06.9419 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: FK/ShCEK4OxYORincLbosSSLA5MtSyIUAqcuQtQjrOv6g4w+5ks4oeGj74tDJxjDY5sss8mUYlX8EqPnSPi39g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR83MB0766
Message-ID-Hash: 7YN7J6IIX2IYOZDCQWWBKHAHQ7YCA7GM
X-Message-ID-Hash: 7YN7J6IIX2IYOZDCQWWBKHAHQ7YCA7GM
X-MailFrom: arndts@microsoft.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Pieter Kasselman <pieter.kasselman=40microsoft.com@dmarc.ietf.org>, "wimse@ietf.org" <wimse@ietf.org>, Justin Richer <jricher@mit.edu>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Wimse] Re: [EXTERNAL] Re: Request for Input: Best Current Practice for OAuth 2.0 Client Authentication in Workload Environments
List-Id: WIMSE Workload Identity in Multi-Service Environment <wimse.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/wimse/58dQgp3v4Dh34HikJ7roCNJMejo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/wimse>
List-Help: <mailto:wimse-request@ietf.org?subject=help>
List-Owner: <mailto:wimse-owner@ietf.org>
List-Post: <mailto:wimse@ietf.org>
List-Subscribe: <mailto:wimse-join@ietf.org>
List-Unsubscribe: <mailto:wimse-leave@ietf.org>
TLDR: I vote for A. As one of the authors, I see value in documenting existing patterns and believe it’s crucial to do this as soon as possible. On the other hand, I understand the concern labelling this as “best current practices”. I would like to propose to: * Move forward with the current scope as “Informational" * Others and I work together to start a new individual draft BCP which contains a wider scope including proof of possession and other aspects (for example Andrii’s feedback) the current scope does not consider. I believe this work can be built on top of the service-to-service authentication work, which is currently in call for adoption where token format and other things are defined. -Arndt From: Andrii Deinega <andrii.deinega@gmail.com> Date: Monday, 29 July 2024 at 23:57 To: Flemming Andreasen (fandreas) <fandreas=40cisco.com@dmarc.ietf.org> Cc: Pieter Kasselman <pieter.kasselman=40microsoft.com@dmarc.ietf.org>, wimse@ietf.org <wimse@ietf.org>, Justin Richer <jricher@mit.edu> Subject: [EXTERNAL] [Wimse] Re: Request for Input: Best Current Practice for OAuth 2.0 Client Authentication in Workload Environments You don't often get email from andrii.deinega@gmail.com. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification> Pieter, I choose to go with C. ATs need to be protected from replay attacks, there must be a proof of possession mechanism in place, without that we can't simply refer to it as BCP. https://mailarchive.ietf.org/arch/msg/wimse/HeF1jAzR6p1BPT_jx_6MuLN7WM0 is also my feedback on this document. All the best, Andrii On Mon, Jul 29, 2024 at 3:17 PM Flemming Andreasen (fandreas) <fandreas=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote: Given the choices, I would go for option A (i.e. no specific recommendations), the reason being I don't think it makes a lot of sense for WIMSE to recommend one thing based purely on OAuth access tokens, when we may end up specifying something different using WIMSE tokens (or whatever we end up calling it). I do think pointing out potential issues with current mechanisms would be helpful though. Thanks -- Flemming On 7/29/24 06:21, Pieter Kasselman wrote: During the Working Group meeting in Vancouver there was discussion on the scope of the Working Group document titled Best Current Practice for OAuth 2.0 Client Authentication in Workload Environments [1], which was adopted in accordance with the following deliverable in the charter [2]: * [I or BCP] Document and make recommendations based on operational experience to existing token distribution practices for workloads. This is intended to respond to the following milestone [3]: * Submit informational document describing considerations for filesystem-based JWT delivery in Kubernetes to the IESG Please reply to the list to indicate which of the following options represent the appropriate scope for this document: 1. Document existing practices without specific recommendations on how to obtain, protect and use OAuth Access Tokens. 2. Document existing practices along with strong recommendations on how to obtain, protect and use OAuth Access Tokens. 3. Need more information (please state what more information you need). 4. No opinion (i.e., this isn’t a topic you care strongly about). Please reply to the list by August 12th, 2024. Thank you, Pieter and Justin [1] https://datatracker.ietf.org/doc/draft-ietf-wimse-workload-identity-bcp/ [2] https://datatracker.ietf.org/doc/charter-ietf-wimse/ [3] https://datatracker.ietf.org/wg/wimse/about/ -- Wimse mailing list -- wimse@ietf.org<mailto:wimse@ietf.org> To unsubscribe send an email to wimse-leave@ietf.org<mailto:wimse-leave@ietf.org>
- [Wimse] Request for Input: Best Current Practice … Pieter Kasselman
- [Wimse] Re: Request for Input: Best Current Pract… Flemming Andreasen (fandreas)
- [Wimse] Re: Request for Input: Best Current Pract… Andrii Deinega
- [Wimse] Re: [EXTERNAL] Re: Request for Input: Bes… Arndt Schwenkschuster
- [Wimse] Re: [EXTERNAL] Re: Request for Input: Bes… Yaron Sheffer
- [Wimse] Re: Request for Input: Best Current Pract… Justin Richer
- [Wimse] Re: Request for Input: Best Current Pract… Yaron Sheffer
- [Wimse] Re: Request for Input: Best Current Pract… Joseph Salowey
- [Wimse] Re: Request for Input: Best Current Pract… Justin Richer
- [Wimse] Re: Request for Input: Best Current Pract… John Kemp
- [Wimse] Re: Request for Input: Best Current Pract… McAdams, Darin