+1 to keep the optional parameter along with clear wording regarding security 
risk and interoperability 

> Am 29.04.2017 um 15:12 schrieb Justin Richer <jric...@mit.edu>:
> 
> +1, documentation is better. Though we also need to keep in mind that this 
> was the justification for the password flow in 6749, which has been abused 
> all over the place (and continues to this day). Still, it would be arguably 
> worse without that so I'm good with keeping the parameter in there as long as 
> we're careful.
> Namely: So long as the user code is *also* delivered separately to the user, 
> we would have interoperability between the two. What       I don't think we 
> want is some systems that *require* the URI parameter on the approval URL and 
> other implementations that *forbid* it. That case could end up with something 
> like: I've got a set-top system that's incapable of displaying a separate 
> user code because it always assumes it's baked into the URL, and then I try 
> to put it on a server that requires the code be entered separately. 
> The resulting spec needs to be clear that the box MUST be able to display 
> both the URL and the code separately, in case the URL does not include the 
> code. In fact, maybe we'd even want to introduce a new parameter from the 
> endpoint for the pre-composed URL:
> 
>    user_code
>       REQUIRED.  The end-user verification code.
> 
>    verification_uri
>       REQUIRED.  The end-user verification URI on the authorization
>       server.  The URI should be short and easy to remember as end-
>       users will be asked to manually type it into their user-agent.
>    composite_verification_uri
>       OPTIONAL.  The end-user verification URI with the end-user 
>       verification code already included. See discussion in [blah]
>       for its use.
> 
>  -- Justin
> 
>> On 4/28/2017 6:38 PM, John Bradley wrote:
>> I would like to keep the optional parameter.   It is useful enough that if 
>> we don’t have it people will add it on there own as a custom parameter.  
>> Better to document any issues. 
>> 
>> John B.
>>> On Apr 28, 2017, at 5:39 PM, William Denniss <wdenn...@google.com> wrote:
>>> 
>>> Thanks all who joined us in Chicago in person and remotely last month for 
>>> the discussion on the device flow. [recording here, presentation starts at 
>>> about 7min in].                 
>>> 
>>> The most contentious topic was addition of the user_code URI param 
>>> extension (introduced in version 05, documented in Section 3.3).
>>> 
>>> I'd like to close out that discussion with a decision soon so we can 
>>> advance to a WG last call on the draft.
>>> 
>>> To summarise my thoughts on the param:
>>> It can be can be used to improve usability – QR codes and NFC can be used 
>>> with this feature to create a more delightful user authorization experience.
>>> It may increase the potential phishing                       risk (which we 
>>> can document), as the user has less typing. This risk assessment is likely 
>>> not one-size-fits-all, it may vary widely due to different the different 
>>> potential applications of this standard.
>>> The way it's worded makes it completely optional, leaving it up to the 
>>> discretion of the authorization server on whether to offer the 
>>> optimisation, allowing them to secure it as best they see it.
>>> I do believe it is possible to design a secure user experiance that 
>>> includes this optimization.
>>> I think on the balance, it's worthwhile feature to include, and one that 
>>> benefits interop. The authorization server has complete control over 
>>> whether to enable this feature – as Justin pointed out in the meeting, it 
>>> degrades really nicely – and should they enable it, they have control over 
>>> the user experiance and can add whatever phishing mitigations their 
>>> use-case warrants.  Rarely is there a one-size-fits-all risk profile, 
>>> use-cases of this flow range widely from mass-market TV apps to 
>>> internal-only device bootstrapping by employees, so I don't think we should 
>>> be overly prescriptive.
>>> 
>>> Mitigating phishing is already something that is in the domain of the 
>>> authorization server with OAuth generally, and I know that this is an 
>>> extremely important consideration when designing user authorization flows. 
>>> This spec will be no exception to that, with or without this optimization.
>>> 
>>> That's my opinion. I'm keen to continue the discussion from Chicago and 
>>> reach rough consensus so we can progress forward.
>>> 
>>> Best,
>>> William
>>> 
>> 
>> 
>> 
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to