> -----Original Message-----
> From: Ludwig Seitz <[email protected]>
> Sent: Wednesday, January 30, 2019 12:38 AM
> To: Jim Schaad <[email protected]>; draft-ietf-ace-oauth-
> [email protected]
> Cc: [email protected]
> Subject: Re: Shepard review for draft-ietf-ace-oauth-authz
>
> Thank you Jim,
>
> I'll upload a new version as soon as we have resolved my questions below.
>
> /Ludwig
>
> On 30/01/2019 07:01, Jim Schaad wrote:
> > 1. Update the reference from RFC 5246 to RFC 8446 in all locations
> >
> >
> >
> > Items that don't appear to be resolved:
> >
> > * Section 3.1 - Refresh Token - I don't think that refresh tokens are
> > going to be strings because binary is more efficient.
> > Unless you are going to say that this is not OAuth 2.0, then a
> > refresh token is still a text string.
> >
> > * I don't see any text that is addressing this.
>
> That text just describes how it is in OAuth 2.0 (where refresh tokens are
> strings), since we didn't see the need to specify the use of refresh tokens in
> ACE, we didn't mention them further. If we had we would certainly have
> defined them to be binary.
That would be fine, but you actually do define a CBOR mapping tag for refresh
tokens in the body of the text and define it as binary.
>
> >
> >> On 22/10/2018 21:09, Jim Schaad wrote:
> >>> * Section 5.8.2 - If the RS is going to do introspection, can it send
> > some
> >>> type of "Server Busy - try again in xxx" while it does the introspection
> >>> rather than just doing an ack of the request and possibly waiting a long
> >>> time?
> >>
> >> This is probably transport protocol specific, and we were asked not to
> >> link the framework to a specific protocol, thus I don't know if we can
> >> provide guidance here.
> >
> > I think it would be okay to say something like "some transport protocols
> > may provide a way to indicate that the server is busy and the client should
> > retry after an interval; this type of status update would be appropriate
> > while the server is waiting for an introspection response". Which does
> > provide guidance, but in a non-normative fashion that does not require or
> > prohibit any given transport protocol.
> >
> > * I don't see anything that I think addresses this issue. I would expect
> > it to be a security consideration
>
> There is text in the draft according to the suggestion above in section
> 5.8.1 "The Authorization Information Endpoint". Should that text be
> moved to security considerations?
No, I just missed the text. It just took me three times reading through to
find it.
>
> >
> > Comments on protection of CWT/Token: I am wondering if there needs to
> be
> > any comments on how a CWT is going to be protected. While it is ok to use
> > either a symmetric key or a direct key agreement operation for a single
> > recipient without forcing a signature operation to occur. If the token is
> > going to be targeted a single audience hosted on multiple RSs then a
> > signature operation would be required for the purposes of authentication.
> >
>
> Right. I'll add some security considerations on that.
>
>
> > ****** IANA Section Issues
> >
> > 1. None of the new registries appear to have any guidance for the DEs to
> > use when approving items.
>
> Is it acceptable to add a single guidance section for all of the new
> registries, or does it need to be separate for each of them?
As long as the guidance is comment this is fine. That is what I did for all of
the COSE registries
>
> >
> > 2. The title of the registry "ACE Authorization Server Information" is not
> > really descriptive of what is in the registry. It makes sense in the text
> > but not as a stand along title. Something along the lines of "ACE
> > Authorization Server Request Creation Hints" seems to be closer to a solid
> > identification.
> >
> Would "ACE Authorization Server Discovery Hints" be better?
I thought about that, but it does not really cover the idea of having the nonce
value there or the possibility of later adding things like - ok you should use
this audience or this scope or some other similar thing.
>
> > 3. The mapping registries should use the OAuth registry name as a prefix.
> > Thus "OAuth Access Token Types" and "OAuth Access Token Type CBOR
> Mappings".
> >
> Done. Actually quite some changes were required to align all of the
> mappings sections with the OAuth registry names.
>
> > 4. What is the initial registrations that need to occur for the "ACE
> > Profile" registry. If there are none then this needs to be stated.
> >
> It's initially empty, since draft-ieft-ace-oauth-authz doesn't define a
> profile. However the DTLS and OSCORE profile will provide the two
> initial entries. I added a sentence to that effect in the IANA section.
Yea, I thought that was the case since the registrations are actually done in
the profile documents. I just wanted to make sure that IANA realized that this
was initially going to be an empty registry.
Jim
>
> > 5. For the CBOR Web Token Claims - how many of these should have the
> JWT
> > Claim name filled in? It would seem that all of them should. If not a
> > comment about this is needed.
> Fixed.
>
> /Ludwig
>
> --
> Ludwig Seitz, PhD
> Security Lab, RISE
> Phone +46(0)70-349 92 51
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace