I am strongly against requiring the AS to know about RS URIs and managing that based on a client request for a token. I've stated my reasons previously.

Happy to agree to disagree:)

Thanks,
George

On 3/10/16 10:17 PM, Phil Hunt (IDM) wrote:
Nat,

Agree with your points.

Regarding the last, I am not sure an AS should release the set of valid rs's. I think the returned data has to be limited somehow. Maybe by aud uri or maybe just a yes/no to a uri the client provides. This needs discussion.

Am worried about the resource side discovery and how much we can intrude here. It may have similar issues disclosing approved ASs.

Finally since we might not control rs discovery it may be possible that the discovery is fake. Maybe this is where something like software statements comes into play as it would at least prevent a mitm from changing the assertions in its discovery. It would not have the RS's private key and this signed statements might build trust.

Phil

On Mar 10, 2016, at 18:24, Nat Sakimura <sakim...@gmail.com <mailto:sakim...@gmail.com>> wrote:

Phil,

Right. So what my conditional approvals (11 conditions in total) said was to drop the word "discovery" from everywhere. This is not a discovery spec. This is a configuration lookup spec as you correctly points out. So, I am with you here.

Also, my 2nd conditiion is essentially saying to drop section 3.

One thing that I overlooked and am with you is that we need to be able to express the AS-RS relationships. I have been preaching this in the other thread for so many times as you know so I thought I pointed it out, but missed apparently in my previous comment. So, I would add my 12th condition:

12. A way to express a list of valid RSs for this AS needs to be added to section 2.

Best,

Nat

2016-03-11 2:09 GMT+09:00 Phil Hunt (IDM) <phil.h...@oracle.com <mailto:phil.h...@oracle.com>>:

    I strongly oppose. 2 major issues.

    This is not service discovery this is configuration lookup. The
    client must have already discovered the oauth issuer uri and the
    resource uri.

    The objective was to provide a method to ensure the client has a
    valid set of endpoints to prevent mitm of endpoints like the
    token endpoint to the resource server.

    The draft does not address the issue of a client being given a
    bad endpoint for an rs. What we end up with is a promiscuous
    authz service giving out tokens to an unwitting client.

    Phil

    On Mar 10, 2016, at 08:06, Vladimir Dzhuvinov
    <vladi...@connect2id.com <mailto:vladi...@connect2id.com>> wrote:

    +1 to move forward with these

    On 10/03/16 17:35, Brian Campbell wrote:
    +1

    On Thu, Mar 10, 2016 at 6:04 AM, Roland Hedberg<roland.hedb...@umu.se> 
<mailto:roland.hedb...@umu.se>
    wrote:

    I support this document being moved forward with these two changes:

    - change name to “OAuth 2.0 Authorization Server Discovery Metadata” as
    proposed by Brian and
    - use the URI path suffix ’oauth-authorization-server’ instead of
    ’openid-configuration’ as proposed by Justin.

    18 feb 2016 kl. 14:40 skrev Hannes Tschofenig <hannes.tschofe...@gmx.net 
<mailto:hannes.tschofe...@gmx.net>
    :

    Hi all,

    This is a Last Call for comments on the  OAuth 2.0 Discovery
    specification:
    https://tools.ietf.org/html/draft-ietf-oauth-discovery-01

    Since this document was only adopted recently we are running this last
    call for **3 weeks**.

    Please have your comments in no later than March 10th.

    Ciao
    Hannes & Derek

    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth
    — Roland

    ”Everybody should be quiet near a little stream and listen."
     From ’Open House for Butterflies’ by Ruth Krauss


    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth




    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth

    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org <mailto:OAuth@ietf.org>
    https://www.ietf.org/mailman/listinfo/oauth




--
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en


_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to