Thanks a bunch for your review, William.  Draft -06 incorporates the results of 
your feedback.  Replies are inline.

                                                                -- Mike

From: OAuth [mailto:[email protected]] On Behalf Of William Denniss
Sent: Monday, February 20, 2017 4:59 PM
To: Hannes Tschofenig <[email protected]>
Cc: [email protected]
Subject: Re: [OAUTH-WG] Working Group Last Call on OAuth 2.0 Authorization 
Server Metadata

I have reviewed version 05. Two minor comments regarding Section 2.1:

1. Should we clarify that alg:none isn't supported for the signed_metadata JWT 
(since it would be contradictory)?

It already says “The signed metadata MUST be digitally signed or MACed using 
JSON Web Signature (JWS) [JWS]”.  Given that “alg”: “none” doesn’t satisfy this 
MUST, I don’t think we need to say anything additional about it.

2. Re: "metadata values conveyed in the signed metadata MUST take precedence 
over those conveyed using plain JSON elements."  Does this imply that *all* 
values in the plain JSON elements should be ignored when the signed_metadata is 
being used (not just ones present in the JWT)? If not, should it?

This is a good request for clarification.  It’s been updated to say “If the 
consumer of the metadata supports signed metadata, metadata values conveyed in 
the signed metadata MUST take precedence over the corresponding values conveyed 
using plain JSON elements.”

Overall, I strongly support the publishing of this document as an RFC for the 
following reasons:

Having "machine readable" configuration metadata published by authorization 
servers is a useful concept. The Google authorization server (like many others) 
publishes metadata compliant with this specification, and the AppAuth series of 
client libraries are capable of consuming it.

Without this standardized machine-readable metadata, developers must read 
documentation to extract the relevant information, and configure clients 
manually. This is cumbersome, error prone, and may get out of date.

This specification can also help prevent one category of "mix up" attack in 
systems which allow self-registration of OAuth endpoints for connected 
services. Rather than the developer supplying both the authorization and token 
endpoints themselves (which may enable them to specify a malicious token 
endpoint), such a system can use the token endpoint specified in the 
authorization server's metadata, thus preventing this category of attack (and 
simplifying the registration process to boot).


On Mon, Feb 20, 2017 at 1:45 AM, Hannes Tschofenig 
<[email protected]<mailto:[email protected]>> wrote:
Hi all,

it was roughly a year ago when we issued a working group last call on
draft-ietf-oauth-discovery, see
https://www.ietf.org/mail-archive/web/oauth/current/msg15796.html. Lots
of feedback resulted in a significant restructuring of the document.

The authors of the draft now believe it is ready for a second WGLC and
hence we would like to start a 2-week review period.

Please provide your review comments no later than March 6th.

Here is the link to the document again:
https://tools.ietf.org/html/draft-ietf-oauth-discovery-05

Ciao
Hannes & Derek


_______________________________________________
OAuth mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to