Rich Salz helped Hannes Tschofenig run the meeting as a guest facilitator

Brian Campbell discussed the status of Token Exchange
              Hannes: The consensus during the Monday meeting was to gain more 
implementation experience before WGLC
              Hannes asked who is implementing or planning to implement Token 
Exchange
                            Justin Richer
                            Brian Campbell
                            Mike Jones
                            Dick Hardt
                            Tony Nadalin
                            William Denniss expressed an interest in having 
Google do so during the previous meeting

Torsten Lodderstedt presented about his new draft on security issues revealed 
by practical OAuth deployments
              draft-lodderstedt-oauth-security-topics
              He wants to provide practical guidance to implementers
              OAuth is used in much more complex and dynamic setups than 
originally anticipated
              This is intended to be a working document - not a standard
                           Capture threats and mitigations
              He plans to refer to other drafts, for instance the 
mix-up-mitigation draft
              He plans to have there be a list of things that developers need 
to do to securely use OAuth
              Tony Nadalin:  We've had a lot of discussions at Microsoft lately 
on the large number of OAuth documents
                           Developers are having problems combining them 
together and knowing what to implement
                           Tony agrees with what Torsten is trying to do but 
doesn't think that it's enough
              Torsten: We're focusing first on documenting the obvious problems
                           We didn't update the security model when we added 
dynamic registration, for instance
                           There's a need to recommend best practices
              Tony Nadalin:  The many OAuth add-ons are not part of an overall 
architecture
                           For instance, PKCE was just a patch solving a 
problem we could have avoided up front
              Ben Kaduk: You should go ahead and do this even without working 
group adoption
                           Torsten: I want it to record the conclusions of the 
working group - not just my personal opinions
              Dick Hardt:  Why are we starting on this now?
                           Torsten: Because we understand many of the security 
best practices now
              Dick:  Why not broaden the scope from security best practices to 
OAuth best practices?
                           Torsten:  Because it would get huge
              John Bradley: That's just a document management issue.  I support 
working on best practices.
                           I believe we need to adopt this so that it becomes 
an RFC so that it is taken seriously by some stakeholders
                           BCPs should be task-oriented
                           For instance, someone doing a single page 
application may not need to be concerned about Token Exchange
              Hannes: Doing focused BCPs seems more manageable than trying to 
do a comprehensive architecture document
              Torsten:  Security practices are cross-cutting
              Dick:  I agree that the security BCP should be all in one place
              Torsten:  We need feedback on which scenarios and flows matter 
most to people
              William Denniss:  I think it should be a BCP and be an RFC as 
soon as possible
                           I like the BCP model of being able to snapshot and 
revise

              Hannes: Who is in favor of adopting this as a WG document?
                           At least 15 were in favor and no one opposed
                            Kathleen Moriarty:  It looks good
              Hannes:  Let's make OAuth great again

Justin Richer presented on the motivations for the HTTP Signing document
              draft-ietf-oauth-signed-http-request
              The current spec includes signing, presentation of the token, and 
a method for protecting the HTTP request
              OAuth 2.0 doesn't include HTTP message signing, whereas OAuth 1.0 
did
                           Developers often got signing wrong in OAuth 1.0
              Justin's draft is designed for the real world understanding that 
many things will be changed in transit
                           Therefore, you only sign the things that you know 
you care about and will be unchanged
              There are corner cases that the spec does not cover
              This is all optional
              The base signature is over the access token plus the 
nonce/timestamp/transaction-identifier

              Justin proposes putting the HTTP signing in one document and the 
base signature description in another
                           The HTTP signing can be experimental
                           This is a detached signature
              He proposes to move both documents forward together
              You need a method to present the PoP token to the resource
              This would be another presentation method parallel to RFC 6750
              Justin and a few others have implemented the current approach
              Ben Kaduk: Do you plan to define discovery?
                           Justin: No.  Discovery isn't defined for OAuth and 
so this work has taken the same position.

              Hannes: At the Berlin IETF meeting the feeling was that we didn't 
need to do this work anymore
              Hannes: Who thinks that we should continue this work in this 
working group?
                           6 for
                           3 against
              Kathleen Moriarty:  Take it to the list

              Dick Hardt:  Has anyone deployed this?
                           Justin: Not in large scale
              John Bradley: Token presentment without having an audience 
restriction for the token doesn't buy you much
                           If we're going to do this work, we should do that too
              Mike Jones:  I'm on record on the mailing list as saying that I 
don't think we should be doing this work
                           It's not clear to me that this is worth our time.  
We're doing a lot and this takes time away from other things.
                           I haven't seen a groundswell of people wanting to 
deploy this
              Hannes:  Per Kathleen, we need to take it to the list
              Kathleen:  This discussion seems pretty stuck to me

John Bradley spoke about the resource indicator specification and other 
outstanding work
              There is implementation experience with the resource indicator
              John plans to do a BCP about single-page (JavaScript) applications
              Torsten: We should focus on the most relevant BCP
              Tony Nadalin:  Single-page applications are not a major focus 
within Azure

              Hannes: I will send a note to the list asking people which BCPs 
they would like to see
              John: We also have lingering work for using postMessage to 
replace fragment encoding
                            postMessage is complicated.  It probably requires a 
lot of guidance
                            Torsten:  We should ask people whether this is 
important to them
                           Mike Jones:  The postMessage draft is an individual 
submission - not a working group document

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to