It’s not really an interop issue either, given that following or not following 
this requirement doesn’t alter the shape of messages or tokens. It’s more of an 
architectural requirement, which preserves the relationships between the OAuth2 
roles involved and prevents the confusion that might arise by the availability 
of data that characterizes this particular scenario, but that doesn’t change 
the more general premises of the protocol. In terms of finding common ground, I 
am not sure if visions as diametrically opposed as pitting a MUST against a 
MUST NOT have much of an achievable common ground, especially given that the 
MUST NOT stance already passed consensus in the past year, and in more than one 
month of very public debate during last calls, the MUST side had mostly one 
backer and more than one opposed..

From: Jared Jennings <jaredljenni...@gmail.com>
Date: Monday, May 11, 2020 at 20:14
To: Vittorio Bertocci <vittorio.berto...@auth0.com>
Cc: Denis <denis.i...@free.fr>, Benjamin Kaduk <ka...@mit.edu>, 
"oa...@ietf..org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Second WGLC on "JSON Web Token (JWT) Profile for OAuth 
2.0 Access Tokens"

Hi Vittorio,

Yeah, this does make a bit of sense. So, the goal is to guide implementors from 
making bad choices, not from a security perspective. Meaning, it's not a 
security risk that a client does inspect or analyze the token. Instead, it's is 
an interop issue and thus we are guiding implementors to never assume or expect 
the token format to be consistent or of a expected format, for various reasons. 
I kinda know the answer to this question, but I am kinda asking this way to 
help restate the intent of the "topic" and maybe help guide to a wording that 
works for everyone.

For example, as a consultant, it can be very helpful to know how to decompile 
or inspect an "Object", but at the same time knowing that such a method or 
practice should never be used in production.

Jared



On May 11, 2020, at 19:24, Vittorio Bertocci 
<vittorio.berto...@auth0.com<mailto:vittorio.berto...@auth0.com>> wrote:

Real world scenarios are full of situations where additional assumptions can 
lower dangers that must be taken in consideration in the general case, which 
might make less of a risk going against the specin those particular 
circumstances, but their existence doesn’t warrant relaxing guidance for the 
general case. A concrete example: I worked on scenarios where resource servers 
wanted to guarantee some degree of business continuity in case of AS outage, 
which boiled down to RS’ willingness to accept ATs past their declared 
expiration time, on the condition that the AS outage condition was detectable 
and the staleness of the AT didn’t cross a tolerance threshold. The business 
scenario made sense, and the implementer was within their right in deciding 
that disregarding exp in those circumstances was acceptable. Nonetheless, I 
would not argue that given the existence of that scenario, rfc7519 should turn 
its MUST NOT into a SHOULD NOT.


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to