Hi Justin,

-03 was renamed to "Proof-of-Possession Key Semantics for JSON Web Tokens 
(JWTs)" to eliminate this confusion.  The introduction was also revised to 
address related points of confusion.

Thanks again for your review comments.

                                -- Mike

-----Original Message-----
From: OAuth [mailto:[email protected]] On Behalf Of Justin Richer
Sent: Tuesday, March 24, 2015 4:31 PM
To: <[email protected]>
Subject: [OAUTH-WG] Last Call comments on draft-ietf-oauth-proof-of-possession

I believe that this draft is misnamed and therefore somewhat misleading: it’s 
fundamentally a method of protected key transmission using JWT, and not about 
proof of possession of that key. The proof is in simply using the key to create 
a JWT within an application (such as will be in 
draft-ietf-oauth-signed-http-request). Proof of possession of a key does not 
require the transmission of the key or a direct reference through the client 
via a data structure, and I don’t want to accidentally give the impression that 
one needs to use a structured token for proof of possession to work.

For instance, in an alternative approach, the AS can issue a random-blob token 
to the client along side the key value (as it’s done in this draft), and the 
client presents the random-blob token to the RS. The RS then looks up the 
information about the random-blob, using a local lookup or introspection or 
some other magic, to get the information that it needs. The client doesn’t need 
to know anything about it, as the token itself is opaque to the client.

That said, overall the structure and function of the draft is good for what it 
actually is. The client remains agnostic about what’s inside the token itself, 
as in regular OAuth. It gives semantic processing for an RS to process messages 
(of various types) signed by keys issued alongside these structured tokens.

I think this problem could be fixed by renaming the draft and rewriting the 
introduction.

 — Justin
_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to