Perfect – thanks for listening.

                                                       -- Mike

From: Dick Hardt <[email protected]>
Sent: Monday, March 16, 2020 12:32 PM
To: Mike Jones <[email protected]>
Cc: [email protected]; [email protected]; [email protected]
Subject: [EXTERNAL] Re: Clarifying the scope of the OAuth 2.1 spec

Thanks for the suggested text Mike. A little wordy for me, but I agree with the 
intention to minimize market place confusion. I'll discuss how to incorporate 
with my co-authors.
ᐧ

On Mon, Mar 16, 2020 at 11:35 AM Mike Jones 
<[email protected]<mailto:[email protected]>> wrote:
Thanks for the clarifications, Dick.  Here’s my resulting proposed changes.  
Part of my goal here is for people to understand the goals and non-goals from 
reading the abstract.

In the Abstract, change:
This specification replaces and obsoletes the OAuth 2.0 Authorization Framework 
described in RFC 6749<https://tools.ietf.org/html/rfc6749>.
to:
This specification replaces and obsoletes these OAuth 2.0 specifications:  RFC 
6749 and RFC 8252.  It does so by removing portions of them that are no longer 
considered best security practices; the portions that remain are compatible 
with the corresponding portions of the specs being replaced.  By design, it 
does not introduce any new features to what already exists in the OAuth 2.0 
specifications being replaced.

(If you want to list other non-RFCs that you believe that will be obsoleted, 
you can do that too.)

Add this text to the cited paragraph in Section 2.1:
When this specification does not replace existing specifications produced by 
the OAuth working group or other non-OAuth-working-group profiles of OAuth that 
extend OAuth 2.0 via the IANA “OAuth Parameters” registry 
[IANA.OAuth.Parameters], it is intended that those specifications will continue 
to be used with OAuth 2.1 in the same manner that they are with the OAuth 2.0 
specifications being replaced.

The reference for [IANA.OAuth.Parameters] is 
https://www.iana.org/assignments/oauth-parameters/.

The last sentence – saying that stuff not explicitly obsoleted isn’t being 
changed – is critical to reducing the marketplace anxiety that this effort 
might otherwise create.  Please make it a goal to remove uncertainty and 
sources of speculation wherever possible.

Thanks again for the useful discussion.

                                                       -- Mike

From: Dick Hardt <[email protected]<mailto:[email protected]>>
Sent: Monday, March 16, 2020 8:36 AM
To: Mike Jones <[email protected]<mailto:[email protected]>>
Cc: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: Re: Clarifying the scope of the OAuth 2.1 spec

Hi Mike

I'm aligned on the overall messaging. Sorry I was not clear on my feedback -- 
it was directed at your suggested text, specifically the terms "OAuth 2.0" and 
"OAuth 2.0 set of protocols"

FYI: the "new" features, are not new to "OAuth 2.0" per se as they are existing 
specifications -- my point was that they are not features that are in RFC 6749. 
OAuth 2.1 is also NOT a superset of all 22 specifications.

This paragraph in the 2.1 doc attempts to describe what OAuth 2.1 is and is not:

Since the publication of the OAuth 2.0 Authorization Framework 
([RFC6749<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC6749>]) 
in October 2012, it has been updated by OAuth 2.0 for Native Apps 
([RFC8252<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC8252>]),
 OAuth Security Best Current Practice 
([I-D.ietf-oauth-security-topics<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>]),
 and OAuth 2.0 for Browser-Based Apps 
([I-D.ietf-oauth-browser-based-apps<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-browser-based-apps>]).
 The OAuth 2.0 Authorization Framework: Bearer Token Usage 
([RFC6750<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#RFC6750>]) 
has also been updated with 
([I-D.ietf-oauth-security-topics<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>]).
 This Standards Track specification consolidates the information in all of 
these documents and removes features that have been found to be insecure in 
[I-D.ietf-oauth-security-topics<https://tools.ietf.org/id/draft-parecki-oauth-v2-1-00.html#I-D.ietf-oauth-security-topics>].

What changes would you suggest to this?

ᐧ

On Sun, Mar 15, 2020 at 9:01 PM Mike Jones 
<[email protected]<mailto:[email protected]>> wrote:
I’m glad you like the direction of my comments.  Sometimes saying what you’re 
*not* doing is as important as saying what you *are* doing, and I think this is 
such a case.

As an example of why this matters, a developer recently asked me “Would we have 
to use a different set of endpoints for OAuth 2.1?”  We should clearly scope 
this work so that the answer is “No, you would use the same endpoints.”

Given that the abstract talks about obsoleting OAuth 2.0, I believe it’s 
important for the abstract to say what’s being obsoleted, what’s not being 
obsoleted, and what the relationship of the new spec is to the one(s) it’s 
obsoleting.  As used in the vernacular by developers, I believe “OAuth 2.0” 
commonly refers to the set of OAuth 2.0 RFCs approved by this working group, 
which are the set of (currently 22) RFCs listed at 
https://datatracker.ietf.org/wg/oauth/documents/ - as well as at least some of 
the non-RFC specifications that extend OAuth 2.0 via the OAuth registries at 
https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtml, 
particularly [OAuth 2.0 Multiple Response Type Encoding 
Practices<https://openid.net/specs/oauth-v2-multiple-response-types-1_0.html>]. 
 I’m pretty sure you intend that OAuth 2.1 keep using much of that widely 
deployed work and not replace it.  You should be clear about that.

Since you say that there are new features in OAuth 2.1, what are they and are 
they essential to the OAuth 2.1 goals?  Or if they’re not essential, could they 
more profitably be factored into another specification so that the new features 
can be used either with OAuth 2.0 and OAuth 2.1?  That might make the resulting 
messaging to developers much clearer.

                                                       Thanks,
                                                       -- Mike

From: Dick Hardt <[email protected]<mailto:[email protected]>>
Sent: Sunday, March 15, 2020 6:50 PM
To: Mike Jones <[email protected]<mailto:[email protected]>>
Cc: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>
Subject: [EXTERNAL] Re: Clarifying the scope of the OAuth 2.1 spec

Hi Mike

I like where you are going with this, but what do we mean when we say OAuth 
2.0? Is it RFC 6749? What is the OAuth 2.0 set of protocols?

OAuth 2.1 includes features that are not in RFC 6749, so it is not a subset of 
that specification.
ᐧ

On Sun, Mar 15, 2020 at 2:34 PM Mike Jones 
<[email protected]<mailto:[email protected]>> wrote:
The abstract of draft-parecki-oauth-v2-1 concludes with this text:
   This specification replaces and obsoletes the OAuth 2.0 Authorization 
Framework described in RFC 6749<https://tools.ietf.org/html/rfc6749>.

While accurate, I don’t believe that this text captures the full intent of the 
OAuth 2.1 effort – specifically, to be a recommended subset of OAuth 2.0, 
rather than to introduce incompatible changes to it.  Therefore, I request that 
these sentences be added to the abstract, to eliminate confusion in the 
marketplace that might otherwise arise:

    OAuth 2.1 is a compatible subset of OAuth 2.0, removing features that are 
not currently considered to be best practices.  By design, it does not 
introduce any new features to what already exists in the OAuth 2.0 set of 
protocols.

                                                       Thanks,
                                                       -- Mike

P.S.  I assert that any incompatible changes should be proposed as part of the 
TxAuth effort and not as part of OAuth 2.1.

_______________________________________________
OAuth mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to