Re: [Ace] WGLC for draft-ietf-ace-oauth-params

2018-10-29 Thread Ludwig Seitz

On 24/10/2018 22:49, Mike Jones wrote:
3.1, 3.2, and 4.1, parameter definitions: None of these parameter 
definitions specify the syntax of the parameters defined, making 
understanding these quite confusing.  Yes, this is talked about later in 
the doc but there are not even forward references to where the 
definitions are completed in most cases.  Please fully specify the 
parameters when they are defined.


3.1 req_aud: Doesn’t this duplicate the “resource” parameter defined by 
https://tools.ietf.org/html/draft-ietf-oauth-resource-indicators-01?  If 
so, please delete this parameter.  If not, say how it is different and 
why the differences are necessary.


5 cnf in the introspection response: Which token is being referred to by 
the phrase “bound to the token”.  The access token?  The refresh token?  
Another kind of token?  Please make this more specific.


6 CBOR Mappings.  The table contains the magic numbers 8, 17, 18, and 
19.  From what space are these numbers being allocated and what registry 
are they in?  Per my earlier reviews of the ace-authz spec, I believe 
that the ACE OAuth parameters should all be registered in the CWT Claims 
registry because of the possibility of them being used in signed 
requests in a manner analogous to 
https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-17.  The parameters 
need to be registered to avoid claim number conflicts.


Missing Examples:  The best thing you could do to help developers 
understand what these values are and how they use them is to add 
examples, just as was done in RFC 7800.  Please add examples of each of 
the parameters using the JSON representations of them.  Optionally, also 
add CBOR examples if you believe that they will convey important 
information to developers that the JSON example’s don’t.


   Thank you,

   -- Mike


Hello Mike,

thank you for your review. I've added issues to the tracker here:
https://github.com/ace-wg/ace-oauth-params
and will address your comments.

/Ludwig

--
Ludwig Seitz, PhD
Security Lab, RISE
Phone +46(0)70-349 92 51

___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] WGLC for draft-ietf-ace-oauth-params

2018-10-24 Thread Mike Jones
3.1, 3.2, and 4.1, parameter definitions: None of these parameter definitions 
specify the syntax of the parameters defined, making understanding these quite 
confusing.  Yes, this is talked about later in the doc but there are not even 
forward references to where the definitions are completed in most cases.  
Please fully specify the parameters when they are defined.



3.1 req_aud: Doesn't this duplicate the "resource" parameter defined by 
https://tools.ietf.org/html/draft-ietf-oauth-resource-indicators-01?  If so, 
please delete this parameter.  If not, say how it is different and why the 
differences are necessary.



5 cnf in the introspection response: Which token is being referred to by the 
phrase "bound to the token".  The access token?  The refresh token?  Another 
kind of token?  Please make this more specific.



6 CBOR Mappings.  The table contains the magic numbers 8, 17, 18, and 19.  
>From what space are these numbers being allocated and what registry are they 
in?  Per my earlier reviews of the ace-authz spec, I believe that the ACE OAuth 
parameters should all be registered in the CWT Claims registry because of the 
possibility of them being used in signed requests in a manner analogous to 
https://tools.ietf.org/html/draft-ietf-oauth-jwsreq-17.  The parameters need to 
be registered to avoid claim number conflicts.



Missing Examples:  The best thing you could do to help developers understand 
what these values are and how they use them is to add examples, just as was 
done in RFC 7800.  Please add examples of each of the parameters using the JSON 
representations of them.  Optionally, also add CBOR examples if you believe 
that they will convey important information to developers that the JSON 
example's don't.



  Thank you,

  -- Mike



-Original Message-
From: Ace  On Behalf Of Jim Schaad
Sent: Monday, October 8, 2018 2:35 PM
To: ace@ietf.org
Subject: [Ace] WGLC for draft-ietf-ace-oauth-params



The chairs believe that the set of documents dealing with the OAuth framework 
for constrained environments is nearing the point that we should

be able to advance it to the IESG for publication.   We therefore want to

have a full list of issues that need to be dealt with at the Bangkok meeting.



This starts a 2 week WGLC for draft-ietf-ace-oauth-params



We know that the following issues are outstanding:



draft-ietf-ace-oauth-params:

*  No current known issues





Jim & Roman







___

Ace mailing list

Ace@ietf.org<mailto:Ace@ietf.org>

https://www.ietf.org/mailman/listinfo/ace
___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] WGLC for draft-ietf-ace-oauth-params

2018-10-23 Thread Ludwig Seitz

On 22/10/2018 21:09, Jim Schaad wrote:

Here are my WGLC comments:

*  I am not sure that I understand what the protocol flow is when JAR is
being used.  Is there a potential case where a JWT would be used as the
structure of an OAuth response?  If so then is there a problem with defining
cnf in section 4.1?


I wouldn't think so, all the other possible parameters in the 
introspection response are defined to be the claims of the token in RFC 
7662, cnf is a claim of the token, so I don't see why it shouldn't go 
unchanged into the introspection response.


* We need to have a OAuth CBOR integer mapping registry - the items in
section 6 need to be registered into that registry.


That was an oversight. Issue created.



* Review - is the 'cnf' parameter in section 3.2 ok with the OAuth group or
does it need to be renamed as well?



I don't see how this could collide with another meaning. The AS is 
responding with the token and additional information about the token 
here. This parameter was called 'key' in 
draft-ietf-oauth-pop-key-distribution, which felt more phrone to 
misunderstandings to me ("what key?").




* Check that cnf in 4.1 is going to be ok with
draft-ietf-oauth-jwt-introspection-response



If I understood it correctly draft only proposes to replace the whole 
introspection response with a JWT. I don't see why this shouldn't work 
with a CWT as well. No additional data but the JWT/CWT would be sent in 
the introspection response, so there should not be any issue with the 
cnf claim here.



--
Ludwig Seitz, PhD
Security Lab, RISE
Phone +46(0)70-349 92 51

___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] WGLC for draft-ietf-ace-oauth-params

2018-10-22 Thread Jim Schaad
Here are my WGLC comments:

*  I am not sure that I understand what the protocol flow is when JAR is
being used.  Is there a potential case where a JWT would be used as the
structure of an OAuth response?  If so then is there a problem with defining
cnf in section 4.1?

* We need to have a OAuth CBOR integer mapping registry - the items in
section 6 need to be registered into that registry.

* Review - is the 'cnf' parameter in section 3.2 ok with the OAuth group or
does it need to be renamed as well?

* Check that cnf in 4.1 is going to be ok with
draft-ietf-oauth-jwt-introspection-response


Jim



___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace