I also agree that “resource” should be a specific network-addressable URL 
whereas a separate audience parameter (like “aud” in JWTs) can refer to one or 
more logical resources.  They are different, if related, things.

Note that the ACE WG is proposing to register a logical audience parameter 
“req_aud” in https://tools.ietf.org/html/draft-ietf-ace-oauth-params-01 - 
partly based on feedback from OAuth WG members.  This is a general OAuth 
parameter, which any OAuth deployment will be able to use.

I therefore believe that no changes are needed to 
draft-ietf-oauth-resource-indicators, as the logical audience work is already 
happening in another draft.

                                                          -- Mike

From: OAuth <oauth-boun...@ietf.org> On Behalf Of John Bradley
Sent: Saturday, January 19, 2019 9:01 AM
To: Brian Campbell <bcampb...@pingidentity.com>
Cc: Vittorio Bertocci <Vittorio=40auth0....@dmarc.ietf.org>; IETF oauth WG 
<oauth@ietf.org>
Subject: Re: [OAUTH-WG] Shepherd write-up for 
draft-ietf-oauth-resource-indicators-01

We need to decide if we want to make a change.

For security we are location centric.

I prefer to keep resource location separate from logical audience that can be a 
scope or other parameter.

If becomes harder for people to use the parameter correctly if we are too 
flexible.

I would rather have a separate logical audience parameter if we think we want 
one.

John B.

On Sat, Jan 19, 2019, 11:41 AM Brian Campbell 
<bcampb...@pingidentity.com<mailto:bcampb...@pingidentity.com> wrote:
No apology needed, Rifaat. And I apologize if what I said came off the wrong 
way. I was just trying to make light of the situation. And I agree that we 
should not be hamstrung by the process and there are times when it makes sense 
to be flexible with things.

On Fri, Jan 18, 2019 at 6:22 PM Rifaat Shekh-Yusef 
<rifaat.i...@gmail.com<mailto:rifaat.i...@gmail.com>> wrote:
Sorry Brian, I was not clear with my statement.
I meant to say that we should not allow the process to prevent the WG from 
producing a quality document without issues, assuming there is an issue in the 
first place.
Ideally we want to get these identified during the WGLC, but things happen and 
sometimes the WG misses something.

I hear you and agree that this make things difficult for authors. We will make 
sure that this does not become the norm, and we will try to stick to the 
process as much as possible.

Regards,
 Rifaat


On Fri, Jan 18, 2019 at 5:35 PM Brian Campbell 
<bcampb...@pingidentity.com<mailto:bcampb...@pingidentity.com>> wrote:
Thanks Rifaat. Process is as process does, right? I do kinda want to grumble 
about WGCL having passed already but that's mostly because replying to these 
kinds of threads is hard for me and I'll just get over it...

As far as I understand things, the security concerns come into play when the 
client is being told the by the resource how to identity the resource like is 
described in https://tools.ietf.org/html/draft-ietf-oauth-distributed-01 and 
using the actual location in that context ,along with some other checks 
prescribed in that draft, prevents the kind of issues John described earlier in 
the thread.

In cases where the client knows the resource a priori or out-of-band or 
configured or whatever, I don't think the same security concerns arise. And 
using such a known value, be it an actual location or logical representation, 
would be okay.

The resource-indicators draft is admittedly somewhat location-centric in how it 
talks about the value of the 'resource' parameter. But ultimately it defines it 
as an absolute URI that indicates the location of the target service or 
resource where access is being requested. A location can be varying shades of 
abstract and I'd say that using a URI as 'resource' parameter value that's a 
logical identifier that points to some resource is well within the bounds of 
the draft.

So maybe the draft is okay as is?

Or perhaps that's too much to be left as an exerciser to the reader?  And some 
text should be added and/or adjusted so the resource-indicators draft would be 
a little more open/clear about the parameter value potentially being more of a 
logical or abstract identifier and not necessarily a network addressable URL?



On Fri, Jan 18, 2019 at 1:18 PM Rifaat Shekh-Yusef 
<rifaat.i...@gmail.com<mailto:rifaat.i...@gmail.com>> wrote:
I wouldn't worry too much about the process.
If it makes sense to update the document, then feel free to do that.

Regards,
 Rifaat


On Fri, Jan 18, 2019 at 3:08 PM John Bradley 
<ve7...@ve7jtb.com<mailto:ve7...@ve7jtb.com>> wrote:
Yes the logical resource can be provided by "scope"

Some implementations like Ping and Auth0 have been adding another parameter 
"aud" to identify the logical resource and then using scopes to define 
permissions to the resource.

Fortunately, we are using a different parameter name so not stepping on that..

We could go back and try to add text explaining the difference, but we are 
quite late in the process.

I agree that a logical resource parameter may be helpful, but perhaps it should 
be a separate draft.

John B.

On Fri, Jan 18, 2019 at 4:38 PM Richard Backman, Annabelle 
<richa...@amazon.com<mailto:richa...@amazon.com>> wrote:
Doesn’t the “scope” parameter already provide a means of specifying a logical 
identifier?

--
Annabelle Richard Backman
AWS Identity


From: OAuth <oauth-boun...@ietf.org<mailto:oauth-boun...@ietf.org>> on behalf 
of Vittorio Bertocci 
<Vittorio=40auth0....@dmarc.ietf.org<mailto:40auth0....@dmarc.ietf.org>>
Date: Friday, January 18, 2019 at 5:47 AM
To: John Bradley <ve7...@ve7jtb.com<mailto:ve7...@ve7jtb.com>>
Cc: IETF oauth WG <oauth@ietf.org<mailto:oauth@ietf.org>>
Subject: Re: [OAUTH-WG] Shepherd write-up for 
draft-ietf-oauth-resource-indicators-01

Thanks John for the background.
I agree that from the client validation PoV, having an identifier corresponding 
to a location makes things more solid.
That said: the use of logical identifiers is widespread, as it has significant 
practical advantages (think of services that assign generated hosting URLs only 
at deployment time, or services that are somehow grouped under the same logical 
audience across regions/environment/deployments). People won't stop using 
logical identifiers, because they often have no alternative (generating new 
audiences on the fly at the AS every time you do a deployment and get assigned 
a new URL can be unfeasible). Leaving a widely used approach as exercise to the 
reader seems a disservice to the community, given that this might lead to 
vendors (for example Microsoft and Auth0) keeping their own proprietary 
parameters, or developers misusing the ones in place; would make it hard for 
SDK developers to provide libraries that work out of the box with different 
ASes; and so on.
Would it be feasible to add such parameter directly in this spec? That would 
eliminate the interop issues, and also gives us a chance to fully warn people 
about the security shortcomings of choosing that approach.



On Thu, Jan 17, 2019 at 4:32 PM John Bradley 
<ve7...@ve7jtb.com<mailto:ve7...@ve7jtb.com>> wrote:

We have discussed this.

Audiences can certainly be logical identifiers.

This however is a more specific location.  The AS is free to map the location 
into some abstract audience in the AT.

From a security point of view once the client starts asking for logical 
resources it can be tricked into asking for the wrong one as a bad resource can 
always lie about what logical resource it is.

If we were to change it, how a client would validate it becomes challenging to 
impossible.

The AS is free to do whatever mapping of locations to identifiers it needs for 
access tokens.

Some implementations may want to keep additional parameters like logical 
audience, but that should be separate from resource.

John B.
On 1/17/2019 9:56 AM, Rifaat Shekh-Yusef wrote:
Hi Vittorio,

The text you quoted is copied form the abstract of the draft itself.


Authors,

Should the draft be updated to cover the logical identifier case?

Regards,
 Rifaat


On Thu, Jan 17, 2019 at 8:19 AM Vittorio Bertocci 
<vitto...@auth0.com<mailto:vitto...@auth0.com>> wrote:
Hi Rifaat,
one detail. The tech summary says


An extension to the OAuth 2.0 Authorization Framework defining request

parameters that enable a client to explicitly signal to an authorization server

about the location of the protected resource(s) to which it is requesting

access.
But at least in the Microsoft implementation, the resource identifier doesn't 
have to be a network addressable URL (and if it is, it doesn't strictly need to 
match the actual resource location). It can be a logical identifier, tho using 
the actual resource location there has benefits (domain ownership check, 
prevention of token forwarding etc).
Same for Auth0, the audience parameter is a logical identifier rather than a 
location.



On Wed, Jan 16, 2019 at 6:32 PM Rifaat Shekh-Yusef 
<rifaat.i...@gmail.com<mailto:rifaat.i...@gmail.com>> wrote:
All,

The following is the first shepherd write-up for the 
draft-ietf-oauth-resource-indicators-01 document.
https://datatracker.ietf.org/doc/draft-ietf-oauth-resource-indicators/shepherdwriteup/

Please, take a look and let me know if I missed anything.

Regards,
 Rifaat

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


_______________________________________________

OAuth mailing list

OAuth@ietf.org<mailto:OAuth@ietf.org>

https://www.ietf..org/mailman/listinfo/oauth<https://www.ietf.org/mailman/listinfo/oauth>
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth

CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
e-mail and delete the message and any file attachments from your computer. 
Thank you.

CONFIDENTIALITY NOTICE: This email may contain confidential and privileged 
material for the sole use of the intended recipient(s). Any review, use, 
distribution or disclosure by others is strictly prohibited..  If you have 
received this communication in error, please notify the sender immediately by 
e-mail and delete the message and any file attachments from your computer. 
Thank you.
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to