Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Justin Richer
Yes, the request object is JWT-based, but the request URI is not. In other words, you can post a JWT but what you get back is a URI, not the JWT itself. The request URI was always meant to be a reference, and originally it was explicitly a reference to a signed request object. — Justin On

[OAUTH-WG] Transactional Authorization: TXAuth Mailing List and BoF

2019-09-26 Thread Justin Richer
Following up from the discussion in Montreal, we’ve created the non-working-group mailing list TXAuth to start discussion of transactional authorization work. Please join the list here: https://www.ietf.org/mailman/listinfo/txauth We’ve also proposed a BoF for Singapore. The details of the

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Aaron Parecki
> The URI is intended to be a reference not a value. If the client could send a > JWT it would just send a request object instead of a request URI in the first > place. So the intent is that it’s random, and maybe we should just say that > explicitly. I thought this language was explicitly to

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-rar-02.txt

2019-09-26 Thread Aaron Parecki
This is absolutely something that needs to be mentioned in the security & privacy considerations. My worry is that by leading with an example of account numbers in the request URL, we're sending the wrong message. I do see the value in rich authorization requests with no PII like George

Re: [OAUTH-WG] New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Justin Richer
Aaron, some comments inline. — Justin On Sep 26, 2019, at 8:30 AM, Aaron Parecki mailto:aa...@parecki.com>> wrote: Hi Torsten, I'm very glad to see this draft, I think it's definitely needed in this space. Here are some of my thoughts on the draft. "request_uri":

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-rar-02.txt

2019-09-26 Thread Justin Richer
I agree with George that this is a good fit for a security consideration, not a normative requirement. While it’s best to always protect the request data, this isn’t all that much different from having scopes that might leak personal information. Like for example, asking for access to HIV

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-rar-02.txt

2019-09-26 Thread George Fletcher
This is a great point about personal information. However, there are uses for authorization_details that don't specifically relate to personal information. Think an enhancement that has language preference, maybe a device identifier. Maybe we can add more text in the security considerations

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-par-00.txt

2019-09-26 Thread Aaron Parecki
Hi Torsten, I'm very glad to see this draft, I think it's definitely needed in this space. Here are some of my thoughts on the draft. > "request_uri": "urn:example:bwc4JK-ESC0w8acc191e-Y1LTC2" Is it acceptable for the AS to return just an opaque string, rather than something prefixed with

Re: [OAUTH-WG] Fwd: New Version Notification for draft-lodderstedt-oauth-rar-02.txt

2019-09-26 Thread Aaron Parecki
Hi Torsten, Overall I am a fan of a way to provide more structure in authorization requests, and I'm excited to see this draft, so thanks for that. I do have some concerns about one aspect of this. Given its clear intended use as a way to create authorization requests to do things like transfer

[OAUTH-WG] New OAuth for Browser-Based Apps draft -04

2019-09-26 Thread Aaron Parecki
Hi all, I've revised the browser-based apps draft to take into account everything discussed at the previous IETF meeting in Montreal. https://tools.ietf.org/html/draft-ietf-oauth-browser-based-apps-04 Here's a summary of the changes: * Disallow the password grant to bring it inline with the

Re: [OAUTH-WG] I-D Action: draft-ietf-oauth-jwt-introspection-response-08.txt

2019-09-26 Thread Travis Spencer
Some feedback on this draft compared to the last one that I read: * The acronym RS and the term "resource server" are used inconsistently. It would read better IMO if the acronym was always used after being defined or if resource server was always spelled out. Same for AS, but less so. Maybe this