Re: [OAUTH-WG] DPoP introspection not including verification

2024-03-15 Thread Dick Hardt
and > HTU values from the RS, as the AS would not know these directly. > > — Justin > > On Mar 10, 2024, at 4:05 PM, Dick Hardt wrote: > > Hey > > I was reading over RFC 9449 and was surprised that introspection did not > take the DPoP header so that the in

[OAUTH-WG] DPoP introspection not including verification

2024-03-10 Thread Dick Hardt
Hey I was reading over RFC 9449 and was surprised that introspection did not take the DPoP header so that the introspection endpoint could do the check on the DPoP proof rather than forcing the Resource Server to do it.

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-06 Thread Dick Hardt
t illegitimate requests. > However, given the rapid development of these features and lack of > widespread support, I would envision such recommendations to live in a more > "dynamic" document than an RFC. > > Philippe > > — > *Pragmatic Web Security* > *Security

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-06 Thread Dick Hardt
curity concerns that are beyond the realm of > OAuth. > > Philippe > > — > *Pragmatic Web Security* > *Security for developers* > https://pragmaticwebsecurity.com > > On 6 Nov 2023, at 15:39, Dick Hardt wrote: > > +1 to referring to calling out that cookies / he

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-06 Thread Dick Hardt
to say, >>>> but we should put them on the list for a future second version of the BCP. >>>> >>>> -Daniel >>>> Am 05.11.23 um 20:03 schrieb Aaron Parecki: >>>> >>>> I don't think the Security BCP should incorporate cookie

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-05 Thread Dick Hardt
And Google is not following setting the Referrer-Policy header https://securityheaders.com/?q=https%3A%2F%2Faccounts.google.com=on On Sun, Nov 5, 2023 at 11:35 AM Dick Hardt wrote: > For example, Auth0 has not set any CSP on this endpoint: > > https://securityheaders.com/?q=https%3A%2

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-05 Thread Dick Hardt
For example, Auth0 has not set any CSP on this endpoint: https://securityheaders.com/?q=https%3A%2F%2Fauth0.openai.com The CSP recommendations are buried in the BCP currently On Sun, Nov 5, 2023 at 11:28 AM Dick Hardt wrote: > The cookie and header recommendations I am thinking of wo

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-05 Thread Dick Hardt
o specific architectures, >> not as a general best practice. For example: >> >> >> https://www.ietf.org/archive/id/draft-ietf-oauth-browser-based-apps-15.html#pattern-bff-cookie-security >> >> Aaron >> >> On Sun, Nov 5, 2023 at 10:48 AM Dick Hardt wr

Re: [OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-05 Thread Dick Hardt
entioned in > the Browser Apps BCP, though only in reference to specific architectures, > not as a general best practice. For example: > > > https://www.ietf.org/archive/id/draft-ietf-oauth-browser-based-apps-15.html#pattern-bff-cookie-security > > Aaron > > On Sun, Nov 5,

[OAUTH-WG] Cookies & headers in OAuth 2.0 Security Best Current Practice?

2023-11-05 Thread Dick Hardt
Hey I was reviewing security on some sites I managed and checked to see if the recommendations were in the BCP. I don't see anything around cookies such as httpOnly, sameSite, secure. I saw some HTTP security header suggestions buried in 4.16 (X-Frame-Options, CSP), but not for

Re: [OAUTH-WG] [SPICE] Relationship between SPICE and OAuth

2023-11-03 Thread Dick Hardt
One source of delays could be different chairs that don't have the same context. Hard to imagine why the people participating in the oauth group would not keep participating in a spice group. I don't have a strong opinion -- but I am surprised by the angst expressed about having a discussion

Re: [OAUTH-WG] [SPICE] Relationship between SPICE and OAuth

2023-11-01 Thread Dick Hardt
I can't help myself to not reply to this ... :) On Wed, Nov 1, 2023 at 11:18 AM Denis wrote: > > > Bridging the architectural narrative used in the core OAuth framework (AS, > RS, RO) and in the three roles model > (Holder, Issuer, Verifier) would not be appropriate. > I'm not sure "would not

Re: [OAUTH-WG] Fwd: New Version Notification for draft-gilman-wimse-use-cases-00.txt

2023-08-28 Thread Dick Hardt
Link for WIMSE list https://www.ietf.org/mailman/listinfo/wimse On Mon, Aug 28, 2023 at 11:12 AM Justin Richer wrote: > Hi all, > > Back at IETF116 in Yokohama, Evan Gilman presented information about > SPIFFE, a workload security platform. At IETF 117 in SF, we presented a set > of questions

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Dick Hardt
While a breach of a BFF may be as catastrophic as an exfiltration of an access token, the BFF may also be more secure against a breach. For example, a BFF could detect a possible compromise by the API usage pattern becoming unusual to the app, that a RS is not able to detect as the general usage

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-28 Thread Dick Hardt
I agree we should continue to explore service workers — but it does not seem that using them is a best current practice — and on that basis and assuming that is correct, I think the SW approach should be dropped from the document. On Mon, Aug 28, 2023 at 8:31 AM Yannick Majoros wrote: > I think

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-27 Thread Dick Hardt
essive information disclosure. > > Regards > Jaimandeep Singh > > On Sat, 26 Aug, 2023, 8:27 pm Dick Hardt, wrote: > >> Jaimandeep: Do I understand your objection to adoption is that providing >> a resource discovery endpoint increases the attack surface as an >> a

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-26 Thread Dick Hardt
Jaimandeep: Do I understand your objection to adoption is that providing a resource discovery endpoint increases the attack surface as an attacker gains knowledge about the resource? If I understand that correctly, then you are suggesting security through obscurity. As mentioned by Aaron, there

Re: [OAUTH-WG] Call for adoption - Protected Resource Metadata

2023-08-23 Thread Dick Hardt
I support adoption. On Wed, Aug 23, 2023 at 12:02 PM Rifaat Shekh-Yusef wrote: > All, > > This is an official call for adoption for the *Protected Resource > Metadata* draft: > https://datatracker.ietf.org/doc/draft-jones-oauth-resource-metadata/ > > Please, reply on the mailing list and let us

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-13 Thread Dick Hardt
Philippe: thanks for investigating each of the links I provided. I had mistakenly assumed that the SW would be managing the entire OAuth interaction per the recommendation. Yannick: thank you for sharing your own experience and views. It seems that the SW recommendation is aspirational rather

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-11 Thread Dick Hardt
o having this as one of the > “recommended approaches” in an RFC. > > Hope this helps > > Philippe > > > On 11 Aug 2023, at 02:56, Dick Hardt wrote: > > > Philippe: would you expand on your comment: > > On Wed, Aug 9, 2023 at 11:51 PM Philippe De Ryck < &

Re: [OAUTH-WG] WGLC for Browser-based Apps

2023-08-10 Thread Dick Hardt
Philippe: would you expand on your comment: On Wed, Aug 9, 2023 at 11:51 PM Philippe De Ryck < phili...@pragmaticwebsecurity.com> wrote: - Remove unproven and overly complicated solutions (i.e., the service worker approach) A quick Google on oauth service workers returned a number of articles

Re: [OAUTH-WG] OAuth Trust model

2023-08-10 Thread Dick Hardt
e site to verify the identity. > > > Sorry for that stupid example but I'm really not able to explain the issue > in another way anymore :( > On 8/11/23 00:02, Dick Hardt wrote: > > This sentence does not make sense to me "which AS is AUTHORIZED at which > RS acti

Re: [OAUTH-WG] OAuth Trust model

2023-08-10 Thread Dick Hardt
try to think from a different > perspective: > > As authorization protocol, how can it not let the user decide which AS is > AUTHORIZED at which RS acting as the user? > > > On 8/10/23 23:28, Dick Hardt wrote: > > "auth providers" is an extremely confusing term.

Re: [OAUTH-WG] OAuth Trust model

2023-08-10 Thread Dick Hardt
"auth providers" is an extremely confusing term. OAuth has no involvement in the content an RS provides the client -- the AS only provides authorization to access the content at the RS. It is common that the AS and RS are the same entity, but the protocol is designed to have a separation of

Re: [OAUTH-WG] [External Sender] Re: OAuth Trust model

2023-08-10 Thread Dick Hardt
Per https://openid.net/specs/openid-connect-core-1_0.html OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile

Re: [OAUTH-WG] Call for adoption - SD-JWT-based Verifiable Credentials

2023-07-29 Thread Dick Hardt
I support adoption On Sat, Jul 29, 2023 at 12:25 PM Rifaat Shekh-Yusef wrote: > All, > > This is an official call for adoption for the *SD-JWT-based Verifiable > Credentials *draft discussed in SF. > https://datatracker.ietf.org/doc/draft-terbu-oauth-sd-jwt-vc/ > > Please, reply on the mailing

Re: [OAUTH-WG] [GNAP] Publication has been requested for draft-ietf-gnap-core-protocol-15

2023-07-06 Thread Dick Hardt
d other four are prototype (and > given one of those is SecureKey and another one is Gen Digital (ex. Secure > Key), that relationship should probably be clarified). > > > > Best, > > Kristina > > > > *From:* OAuth *On Behalf Of * Dick Hardt > *Sent:* We

Re: [OAUTH-WG] [GNAP] Publication has been requested for draft-ietf-gnap-core-protocol-15

2023-06-28 Thread Dick Hardt
I just noticed this doc is up for publication. I did a quick search on the last call discussion, and did not see any +1s, nor any review by any of the active members of the OAuth WG. This is very surprising given the functional overlap with OAuth 2.0, and the years of deployment experience in

Re: [OAUTH-WG] [IANA #1270370] Request to register OAuth Authorization Server Metadata: dpop_signing_alg_values_supported

2023-04-05 Thread Dick Hardt
I approve this request. On Wed, Apr 5, 2023 at 8:47 AM David Dong via RT < drafts-expert-review-comm...@iana.org> wrote: > Dear Michael, Nat, John and Dick (cc: oauth WG / review mailing list), > > As the designated experts for the OAuth Authorization Server Metadata > registry, can you review

Re: [OAUTH-WG] OAuth 2.0 Protected Resource Metadata

2023-01-28 Thread Dick Hardt
I support adoption by the WG On Fri, Jan 27, 2023 at 8:51 AM Mike Jones wrote: > Given that the draft is now being used, I support working group adoption. > > > > I’d also like to request time in Yokohama to talk about the draft. > > > >

Re: [OAUTH-WG] OAuth2 Client Discovery

2022-12-15 Thread Dick Hardt
On Thu, Dec 15, 2022 at 12:39 PM Tobias Looker wrote: > > Would be good to see tos_uri and policy_uri (personally, I'm > disappointed in the name policy_uri as policy is a much broader context > than privacy -- but that discussion is over =) > > Ok so to be clear you are suggesting we update the

Re: [OAUTH-WG] OAuth2 Client Discovery

2022-12-14 Thread Dick Hardt
Mw%26u%3Dhttps%253a%252f%252fgithub.com%252fmattrglobal=04%7C01%7CSteve.Lowes%40mbie.govt.nz%7C5a65fe33c70b41fd8ba908d976f3a2f1%7C78b2bd11e42b47eab0112e04c3af5ec1%7C0%7C0%7C637671611076729970%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000=4AhRuXZCnU

Re: [OAUTH-WG] OAuth2 Client Discovery

2022-12-14 Thread Dick Hardt
1. I see the value of client discovery for registered clients as well as for registering clients. For example, the client may be registered at a number of ASes, and a discovery document lets the client update its information once at its discovery endpoint rather than having to manually update the

Re: [OAUTH-WG] Call for adoption - SD-JWT

2022-07-28 Thread Dick Hardt
+1 On Thu, Jul 28, 2022 at 5:17 PM Rifaat Shekh-Yusef wrote: > All, > > This is a call for adoption for the *SD-JWT* document > https://datatracker.ietf.org/doc/draft-fett-oauth-selective-disclosure-jwt/ > > Please, provide your feedback on the mailing list by *August 12th*. > > Regards, >

Re: [OAUTH-WG] DPoP JWT claims

2022-06-16 Thread Dick Hardt
> The official IANA registration of “nonce” says: > > > Value used to associate a Client session with an ID Token > > > Does this matter? If not, does it matter if some other spec defines a “htm” > claim with different meaning? > > > On 16 Jun 2022, at 20:50,

Re: [OAUTH-WG] DPoP JWT claims

2022-06-16 Thread Dick Hardt
Registering the names provides clarity on use and avoids confusion on the meaning of a claim — ie two specs won’t have conflicting definitions of “htm” On Thu, Jun 16, 2022 at 10:20 AM Warren Parad wrote: > I think the registration really helps with discovery, especially as an > implementer.

Re: [OAUTH-WG] questions around OAuth 2.0 for Browser-Based Apps

2022-06-14 Thread Dick Hardt
Best practices according to whom? This list, and documents such as: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics Wouldn't the concerns of section 6 of your draft better be parts of a follow-up or addendum to rfc-6749? OAuth 2.1 has no normative changes over OAuth

Re: [OAUTH-WG] Multi-Subject JWT draft

2022-06-14 Thread Dick Hardt
Hi Rifaat I'm suspecting there was a conversation on changing the name to multi-subject JWT. Would you provide a pointer or short summary? I find the name concerning as I am looking at a very different concept that would also be considered a multi-subject JWT. My use case is where user

Re: [OAUTH-WG] [IANA #1216703] Expert Review for draft-ietf-oauth-iss-auth-resp (oauth-parameters)

2022-01-06 Thread Dick Hardt
Given you sent the initial review a few months ago, let’s not hold up the process and move forward. On Thu, Jan 6, 2022 at 7:23 PM Amanda Baber via RT < drafts-expert-review-comm...@iana.org> wrote: > Hi, > > On Fri Jan 07 01:12:36 2022, dick.ha...@gmail.com wrote: > > Unfortunately I don’t know

Re: [OAUTH-WG] [IANA #1216703] Expert Review for draft-ietf-oauth-iss-auth-resp (oauth-parameters)

2022-01-06 Thread Dick Hardt
Unfortunately I don’t know what the approval process is — I don’t feel I need to discuss or review with the others — the IANA registration is pretty straightforward and I have not heard any controversy about it I recall at least 2 of the other experts are aligned on the underlying spec. On

Re: [OAUTH-WG] [UNVERIFIED SENDER] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-27 Thread Dick Hardt
TTP effort that > has recently been chartered to solve similar encapsulation problems in > HTTP. > > - Justin > > From: OAuth [oauth-boun...@ietf.org] on behalf of Dick Hardt [ > dick.ha...@gmail.com] > Sent: Friday, October 22, 2021 6:

Re: [OAUTH-WG] [UNVERIFIED SENDER] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-22 Thread Dick Hardt
I have a use case for a self contained request that can be independently verified by multiple parties. IE, not just have PoP at HTTP endpoint, but by components doing processing further down the line. It also provides non-repudiation. For example, a JWT that is sent as an HTTP payload includes

Re: [OAUTH-WG] convert to credentialed client... ( was OAuth2.1 credentialed client )

2021-10-11 Thread Dick Hardt
Thanks for the feedback Brian. We have struggled in how to concisely describe credentialed clients. "identifying a client" can be interpreted a number of ways. The intent is that the AS knows a credentialed client is the same client it previously interacted with, but that the AS can not assume

Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-08 Thread Dick Hardt
inline On Fri, Oct 8, 2021 at 2:00 PM Richard Backman, Annabelle < richa...@amazon.com> wrote: > IE, if the success of HTTP Signing is tied to the OAuth WG adopting the > draft, then Mike's arguments about the WG already doing this work is valid. > > > It's not the success of HTTP Message

Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-08 Thread Dick Hardt
On Fri, Oct 8, 2021 at 12:39 PM Richard Backman, Annabelle < richa...@amazon.com> wrote: > > Blocking WG development of an OAuth 2.0 profile of Message Signatures > behind widespread deployment of Message Signatures risks creating a > deadlock where the WG is waiting for implementations from

Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-08 Thread Dick Hardt
> > HTTP Message Signing exists, people are implementing it and using it. Token Binding existed as well. HTTP Message Signing is not yet an RFC, and in my opinion it only makes sense for OAuth to build on top of it if it is successful with lots of interoperable deployments. ᐧ On Fri, Oct 8,

Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-06 Thread Dick Hardt
fect time to be able to > influence the draft if needed, rather than wait for it to be finalized and > then have to find a less-than-ideal workaround for something unforeseen. > > Aaron > > On Wed, Oct 6, 2021 at 2:25 PM Dick Hardt wrote: > >> I meant it is not yet ado

Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-06 Thread Dick Hardt
bout a year ago. I would not have suggested > we depend on it for a document within this WG otherwise. > > — Justin > > On Oct 6, 2021, at 5:08 PM, Dick Hardt wrote: > > I am not supportive of adoption of this document at this time. > > I am supportive of the concepts in t

Re: [OAUTH-WG] Call for Adoption - OAuth Proof of Possession Tokens with HTTP Message Signature

2021-10-06 Thread Dick Hardt
I am not supportive of adoption of this document at this time. I am supportive of the concepts in the document. Building upon existing, widely used, proven security mechanisms gives us better security. HTTP Sig looks very promising, but it has not been adopted as a draft, and as far as I know,

Re: [OAUTH-WG] self-issued access tokens

2021-10-04 Thread Dick Hardt
m the responses to this thread so far, I think the answer is > no. > > > > > > Thanks for comment, David, > > > > Yeah, maybe it's wise to have AS anyway for better extensibility. > > > > > > Toshio Ito > > > > *From:* David Waite &

Re: [OAUTH-WG] self-issued access tokens

2021-10-01 Thread Dick Hardt
> So, we are seeking a solution that is more in application layer. > > > > > > Toshio Ito > > > > *From:* Dick Hardt > *Sent:* Friday, October 1, 2021 12:53 PM > *To:* ito toshio(伊藤 俊夫 ○RDC□IT研○CNL) > *Cc:* oauth@ietf.org > *Subject:* Re: [OAUTH-WG] self-is

Re: [OAUTH-WG] self-issued access tokens

2021-09-30 Thread Dick Hardt
So, if we do standardize self-issued access tokens, maybe OAUTH WG is not > the > > right venue. Maybe HTTPBIS or HTTPAPI WGs? > > > > > > Toshio Ito > > > > *From:* Dick Hardt > *Sent:* Wednesday, September 29, 2021 3:06 PM > *To:* ito toshio(伊藤 俊夫 ○RD

Re: [OAUTH-WG] self-issued access tokens

2021-09-29 Thread Dick Hardt
If the client is sending a self-signed JWT to the RS, you essentially are just authenticating directly to the RS. Not really OAuth as the RS has not delegated authorization authority to the AS. If the client sends a self-signed JWT (a PAR) to the AS, and gets back an access token to present to

Re: [OAUTH-WG] [Technical Errata Reported] RFC7009 (6663)

2021-08-24 Thread Dick Hardt
Hey Emond The access token represents the authorization to access the resource(s) -- it does not represent the authorization to manipulate tokens. The client credentials are used for token management. While your implementation may be ok with using the access token to revoke itself, it is not the

Re: [OAUTH-WG] TMI BFF - html meta tags over/alternative to discovery

2021-05-15 Thread Dick Hardt
As I said in the meeting, I think this is an interesting idea that is worth exploring. I don’t think we need to resolve this for WG adoption of the document. On Sat, May 15, 2021 at 8:36 AM Filip Skokan wrote: > Hello Vittorio, Brian, everyone > > This is a followup to my feedback in the TMI

Re: [OAUTH-WG] Call for adoption - TMI BFF

2021-05-04 Thread Dick Hardt
ne with the BFF acronym since it's common >> in the software development world already. If anything, the TMI acronym is >> the least strong of the two as it's missing a letter from the full name of >> the draft. >> >> Aaron >> >> >> >> >

Re: [OAUTH-WG] Call for adoption - TMI BFF

2021-05-04 Thread Dick Hardt
t's common > in the software development world already. If anything, the TMI acronym is > the least strong of the two as it's missing a letter from the full name of > the draft. > > Aaron > > > > > On Tue, May 4, 2021 at 7:40 AM Dick Hardt wrote: > >> I'm supportiv

Re: [OAUTH-WG] Call for adoption - TMI BFF

2021-05-04 Thread Dick Hardt
I'm supportive -- but am concerned with the BFF acronym. ᐧ On Mon, May 3, 2021 at 3:00 PM Rifaat Shekh-Yusef wrote: > All, > > This is a call for adoption for the *Token Mediating and Session > Information Backend for Frontend* as a WG document: >

Re: [OAUTH-WG] Detailed review of OAuth2.1

2020-12-08 Thread Dick Hardt
Thank you very much for your detailed feedback Vittorio! ᐧ On Tue, Dec 8, 2020 at 3:22 PM wrote: > Dear authors, > > It took ages but I finally managed to go thru a full review of the current > OAuth2.1 draft. Apologies for the delay. > > Metacomments: > >- The VAST majority of the comments

Re: [OAUTH-WG] Call for Adoption - AS Issuer Identifier in Authorization Response

2020-12-08 Thread Dick Hardt
+1 ᐧ On Tue, Dec 8, 2020 at 4:51 AM Rifaat Shekh-Yusef wrote: > All, > > This is a call for adoption for the following AS Issuer Identifier in > Authorization Response as a WG document: > > https://datatracker.ietf.org/doc/draft-meyerzuselhausen-oauth-iss-auth-resp/ > > Please, provide your

Re: [OAUTH-WG] Reminder - Interim Meeting to discuss DPoP

2020-12-01 Thread Dick Hardt
I have 2 suggestions for the draft that I beleive address the issues Denis is bringing up: 1) call out that a DPoP proof can only be used once, and a new DPoP proof is needed for every API call. Apologies if that is in the text -- but I could not find it doing a skim over the document. 2)

Re: [OAUTH-WG] DPoP Interim Minutes

2020-11-30 Thread Dick Hardt
m-2020-oauth-16-202011301200-01 > and here: > https://codimd.ietf.org/notes-ietf-interim-2020-oauth-16-oauth?view > > Thanks to *Dick Hardt* for taking these notes. > > Regards, > Rifaat & Hannes > ___ > OAuth mailing list &

Re: [OAUTH-WG] DPoP Binding JWT proposal

2020-11-30 Thread Dick Hardt
Pushing this to the top of the stack in case there is interest in separating the binding mechanism from the RT / AT so that existing RTs / ATs can be used. ᐧ On Fri, Nov 6, 2020 at 2:12 PM Dick Hardt wrote: > Hello > > After reviewing the DPoP spec, and reflecting on implementatio

Re: [OAUTH-WG] Examples of Auth with Profiles

2020-11-12 Thread Dick Hardt
Since there is no security boundary between profiles, the profile is just passed as a parameter to APIs rather than have it in the access token. ᐧ On Thu, Nov 12, 2020 at 1:31 PM Jeff Craig wrote: > Hello OAuth WG, > > I am currently doing some research on APIs that have a Profile concept, >

[OAUTH-WG] DPoP Binding JWT proposal

2020-11-06 Thread Dick Hardt
Hello After reviewing the DPoP spec, and reflecting on implementations I have worked with, I wanted to see if there was interest in a DPoP Binding JWT. The use case is to enable existing deployments to add support for DPoP without having to replace their existing refresh token and access tokens,

Re: [OAUTH-WG] Android App Links (AKA Universal Links)

2020-11-03 Thread Dick Hardt
s signed using the expected certificate. Web2app > flows are trickier, on both iOS and on Android. There were lengthy > discussions on at least the Android case at OAuth Security Workshop this > year (recordings available). > > Joseph > > > On 20 Oct 2020, at 00:09, Dick Hardt wro

Re: [OAUTH-WG] DPoP and refresh tokens

2020-10-28 Thread Dick Hardt
e > language that could be perceived as prohibiting it) but haven't gotten to > that item on the editing todo list yet. > > > > > On Wed, Oct 28, 2020 at 2:46 PM Dick Hardt wrote: > >> Hello >> >> I was reviewing the latest DPoP draft[1] and saw numerous

[OAUTH-WG] DPoP and refresh tokens

2020-10-28 Thread Dick Hardt
Hello I was reviewing the latest DPoP draft[1] and saw numerous mentions of using a DPoP proof for refreshing an access token, but no explicit description of how to do that, nor an example. Was this intentional? Perhaps a new section "Refreshing an Access Token"? Additionally, I can imagine

[OAUTH-WG] Android App Links (AKA Universal Links)

2020-10-19 Thread Dick Hardt
Hey Vittorio (cc'ing OAuth list as this was brought up in the office hours today) https://developer.android.com/training/app-links An app is the default handler and the developer has verified ownership of the HTTPS URL. While a user can override the app being the default handler in the system

Re: [OAUTH-WG] Web Authorization Protocol (oauth) WG Virtual Meeting: 2020-11-02

2020-10-09 Thread Dick Hardt
Please join! ᐧ On Fri, Oct 9, 2020 at 10:17 AM Jeff Hodges wrote: > > The Web Authorization Protocol (oauth) WG will hold > > a virtual interim meeting on 2020-11-02 from 12:00 to 13:00 > America/Toronto (17:00 to 18:00 UTC). > > > > Agenda: > > 1.High level overview of anti-tracking and

Re: [OAUTH-WG] JSON based access token requests for OAuth 2.1

2020-10-07 Thread Dick Hardt
Janak, thanks for the clarification. A constraint of the OAuth 2.1 draft is that it adds no new features beyond what has already been standardised and deployed. While I am a fan of JSON, supporting both application/x-www-form-urlencoded and application/json will negatively impact

Re: [OAUTH-WG] Omit "jwk" (or use "kid" instead) in DPoP Proof?

2020-09-15 Thread Dick Hardt
That was a lot of words Brian. What is the "tl;dr:"? (I read it, but I'm not sure where you landed given your last sentence) ᐧ On Tue, Sep 15, 2020 at 3:16 PM Brian Campbell wrote: > Sorry for the slow reply to this one, Neil. It's gotten me thinking a bit > and it took some time to gather my

Re: [OAUTH-WG] Omit "jwk" (or use "kid" instead) in DPoP Proof?

2020-09-08 Thread Dick Hardt
+1 KISS ᐧ On Tue, Sep 8, 2020 at 3:55 PM John Bradley wrote: > +1 > On 9/8/2020 7:45 PM, Brian Campbell wrote: > > Indeed there are cases, as you point out, where the key might be knowable > to the server via some other means, which makes the "jwk" header in the > DPoP proof not strictly

Re: [OAUTH-WG] draft-ietf-oauth-access-token-jwt-07

2020-09-08 Thread Dick Hardt
Denis The objective of this document is to standardize the token the AS shares with the RS. It is not to standardize how the client can read the token. Just because the user is using the client, that does not mean the user wants the client to see any claims about themselves. Letting the client

Re: [OAUTH-WG] Last Call: (JWT Response for OAuth Token Introspection) to Proposed Standard

2020-08-31 Thread Dick Hardt
Endpoint. That’s why it’s preferable to not use one at >> all and instead directly have the Resource understand the Access Token. >> One way of doing this is the JWT Access Token spec. There are plenty of >> others. >> >> >> >> The downsides of using an

Re: [OAUTH-WG] WGLC Review of PAR

2020-08-30 Thread Dick Hardt
gt; Since parts of the request content, e.g. the "code_challenge" >parameter value, is unique to a certain authorization request, > the client SHOULD use the "request_uri" only once. > > I also would move this text to section 4. > > > On 27. Aug 2020,

Re: [OAUTH-WG] Last Call: (JWT Response for OAuth Token Introspection) to Proposed Standard

2020-08-29 Thread Dick Hardt
If this implication is not acceptable, implementers can > use other means to carry > access token data, e.g. directly transferring the data needed by the > RS within the access token. > > On Aug 27, 2020, at 12:15 PM, Dick Hardt wrote: > > Here is a crisper revision. > > Impl

Re: [OAUTH-WG] third party applications

2020-08-28 Thread Dick Hardt
any constraint on the kind of applications OAuth can > be used for. I don’t see how this governs the protocol design. > > > On 28. Aug 2020, at 15:29, Dick Hardt wrote: > > > > The driver in my opinion for first-party use of OAuth is to separate the > trust domains so that the

Re: [OAUTH-WG] third party applications

2020-08-28 Thread Dick Hardt
The driver in my opinion for first-party use of OAuth is to separate the trust domains so that the application is scoped in what it can do vs an application that has full access to all resources. I agree that third-party can indicate that internal use does not apply. How about the following?

Re: [OAUTH-WG] Last Call: (JWT Response for OAuth Token Introspection) to Proposed Standard

2020-08-27 Thread Dick Hardt
ng this is the JWT Access Token spec. There are plenty of others. > > The downsides of using an Introspection Endpoint should be described in > the Privacy Considerations section. > > -- Mike > > From: OAuth On Behalf Of Di

Re: [OAUTH-WG] WGLC Review of PAR

2020-08-27 Thread Dick Hardt
twice and continue the session as appropriate. > > None of this is in conflict with “one time use”, in my view, since you’re > actively detecting the session and source of the value. > > — Justin > > On Aug 26, 2020, at 6:16 PM, Dick Hardt wrote: > > I think one-time use

Re: [OAUTH-WG] WGLC Review of PAR

2020-08-26 Thread Dick Hardt
I think one-time use may be overly restrictive, and I don't think it is the property that we actually want. Give the request URI is in a redirect from the browser, there is a good chance of a race condition where the same browser request is made more than once, for example, while the browser is

Re: [OAUTH-WG] Last Call: (JWT Response for OAuth Token Introspection) to Proposed Standard

2020-08-26 Thread Dick Hardt
On Wed, Aug 26, 2020 at 4:37 AM Torsten Lodderstedt wrote: > Hi Denis, > > > On 25. Aug 2020, at 16:55, Denis wrote: > > > The fact that the AS will know exactly when the introspection call has > been made and thus be able to make sure which client > > has attempted perform an access to that RS

[OAUTH-WG] office hours / meeting this week?

2020-08-23 Thread Dick Hardt
Are either of these happening tomorrow? If so, what is the WebEx link? Thanks! ᐧ ___ OAuth mailing list OAuth@ietf.org https://www.ietf.org/mailman/listinfo/oauth

Re: [OAUTH-WG] ECDH-1PU encryption algorithm

2020-08-10 Thread Dick Hardt
I'm supportive of this work. It is not clear that it is in the charter of the OAuth WG. On Mon, Aug 10, 2020 at 9:01 AM Filip Skokan wrote: > Hi Neil, > > I'm interested in seeing both AES SIV and ECDH-1PU for JOSE. Not sure how > to go about it tho since JOSE is a concluded WG. > > Out of

[OAUTH-WG] Privacy Considerations section in OAuth 2.1?

2020-08-10 Thread Dick Hardt
In the PAR meeting today, Denis requested there be a privacy considerations section in PAR. I don't think there is anything specific in PAR that would change the privacy considerations of OAuth, and am checking if there is WG interest, and consensus, on including a Privacy Considerations section

Re: [OAUTH-WG] Comments on draft-ietf-oauth-v2-1-00 (The OAuth 2.1 Authorization Framework)

2020-08-06 Thread Dick Hardt
Karsten / Christian: thank you for reviewing the draft and all of your feedback. Greatly appreciated! Responses inline ... if no comment, I (or another author) will have to review to respond. On Thu, Aug 6, 2020 at 3:48 AM Karsten Meyer zu Selhausen < karsten.meyerzuselhau...@hackmanit.de>

Re: [OAUTH-WG] Clarifying Bearer token usage OAuth 2.1 draft-ietf-oauth-v2-1-00

2020-07-30 Thread Dick Hardt
Dev’s now need to read 20 standards to get OAuth2 basics... > and that’s a barrier to entry. > > -- > Jim Manico > @Manicode > > On Jul 30, 2020, at 3:21 PM, Dick Hardt wrote: > >  > One of the constraints of the OAuth 2.1 document that aligned the WG was > it would h

Re: [OAUTH-WG] Clarifying Bearer token usage OAuth 2.1 draft-ietf-oauth-v2-1-00

2020-07-30 Thread Dick Hardt
One of the constraints of the OAuth 2.1 document that aligned the WG was it would have no new features. I'd recommend a separate document for the cookie bearer token feature. ᐧ On Thu, Jul 30, 2020 at 12:15 PM Jim Manico wrote: > Yea to cookie configuration suggestions! > > I suggest

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-21 Thread Dick Hardt
any requirements on > canonicalization for these values. > > — Justin > > On Jul 21, 2020, at 1:03 PM, Dick Hardt wrote: > > > The following are the same URI, but are different strings: > > “https://schema.example.org/v1” > “HTTPS://schema.example.org/v1

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-21 Thread Dick Hardt
An explanation of the issues in Unicode can be found here: https://en.wikipedia.org/wiki/Unicode_equivalence#Character_duplication On Tue, Jul 21, 2020 at 10:03 AM Dick Hardt wrote: > > The following are the same URI, but are different strings: > > “https://schema.example.org/

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-21 Thread Dick Hardt
and not required for the RAR spec. I’m against requiring > the value to be a URI and against requiring the AS to process that URI *as > a URI* at runtime. Anything that an AS wants to do with the “type” value, > including providing additional tooling and validation, is up to the AS and > outside of

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-21 Thread Dick Hardt
value. You brought that up and then described the process that the AS would > take to do so. I have said from the start that the use of a URI is for name > spacing and not for addressing content to be fetched, so I’m confused why > you think I intend otherwise. > > — Justin > >

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-20 Thread Dick Hardt
aller ecosystem. And this is yet another > reason that we define “type” as being a string to be interpreted and > understood by the AS — so that an AS that wants to work this way can do so. > > — Justin > > PS: thanks for pointing out the error in the example in XYZ, I’ll fix tha

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-18 Thread Dick Hardt
etf.org/html/rfc7519#section-4.2 > > What I’m proposing is that if you think it’s going to be a general-purpose > type name, then we recommend you use a URI as your string. And beyond that, > that’s it. It’s up to the AS to figure out what to do with it, and RAR > stays out of it. >

Re: [OAUTH-WG] Namespacing "type" in RAR

2020-07-17 Thread Dick Hardt
Hey Justin, glad to see that you have aligned with the latest XAuth draft on a type property being required. I like the idea that the value of the type property is fully defined by the AS, which could delegate it to a common URI for reuse. This gets GNAP out of specifying access requests, and

Re: [OAUTH-WG] Call for adoption - OAuth 2.1 document

2020-07-15 Thread Dick Hardt
+1 On Wed, Jul 15, 2020 at 10:42 AM Rifaat Shekh-Yusef wrote: > All, > > This is a *call for adoption* for the following *OAuth 2.1* document as a > WG document: > https://www.ietf.org/id/draft-parecki-oauth-v2-1-03.html > > Please, provide your feedback on the mailing list by *July 29th.* > >

Re: [OAUTH-WG] Rotating client secret

2020-07-13 Thread Dick Hardt
I don't know of any discussion for client secret rotation. Another way to solve your problem could be to raise it up a layer. Admin B generates a one time use URL that is sent to Admin A. Admin A visits the URI and obtains the client_id and client_secret. On Mon, Jul 13, 2020 at 2:35 PM

Re: [OAUTH-WG] OAuth 2.1-03 - WG adoption?

2020-07-07 Thread Dick Hardt
Thanks Sascha and Vladimir for the feedback! Sascha: did you have a concern with the document being adopted by the WG? ᐧ On Tue, Jul 7, 2020 at 4:04 PM Sascha Preibisch wrote: > Hi all! > > Here is the rest of my feedback. At the end I also included a list of > typos and the summary of

[OAUTH-WG] OAuth 2.1-03 - WG adoption?

2020-07-06 Thread Dick Hardt
Aaron, Torsten, and I -- with some help from Daniel -- have created a new version of draft-pareck-oauth-v2-1. I think we are ready for a WG adoption call (assuming the updated charter). Here is the doc: https://tools.ietf.org/html/draft-parecki-oauth-v2-1-03 Here is a link to the diff from -02:

  1   2   3   4   5   >