Hi Brian,

I'd like to propose the sentence in bold to be inserted into the current
section 2.3 of PAR -04:

https://tools.ietf.org/html/draft-ietf-oauth-par-04#section-2.3

The authorization server returns an error response with the same format
as is specified for error responses from the token endpoint in
Section 5.2 of [RFC6749] using the appropriate error code from therein
or from Section 4.1.2.1 of [RFC6749]. *In those cases where Section
4.1.2.1 of [RFC6749] prohibits automatic redirection with an error back
to the requesting client and hence doesn’t define an error code, for
example when the request fails due to a missing, invalid, or mismatching
redirection URI, the “invalid_request” error code can be used as the
default error code.*

Hope with this we can close the case.

Vladimir

On 04/12/2020 18:08, Brian Campbell wrote:
>
>
> On Fri, Dec 4, 2020 at 12:30 AM Vladimir Dzhuvinov
> <vladi...@connect2id.com <mailto:vladi...@connect2id.com>> wrote:
>
>     If people have articulated a need to have an invalid_redirect_uri
>     error for the PAR endpoint, then let's register it properly.
>     Rifaat says there's still time to do this.
>
>
> Following from the response I recently sent to Neil, I don't think a
> legitimate need has been articulated.
> https://mailarchive.ietf.org/arch/msg/oauth/gMiH1mTr0AKDvWpqO1zikcVUySY/
>  
>
>     I'm also okay with using the general invalid_request code for
>     this. In this case a sentence, next to the current example,
>     spelling out what the PAR endpoint must do on a invalid redirect
>     URI will help.
>
> I don't know that that's needed either. But do have some text to
> suggest that you think would be helpful?
>
>  
>
>     Vladimir
>
>     On 03/12/2020 13:49, Rifaat Shekh-Yusef wrote:
>>     Torsten, Filip,
>>
>>     You can absolutely make this change, as we are still very early
>>     in the process. 
>>     So feel free to continue this effort and try to get WG agreement
>>     on this, and update the document as needed. 
>>
>>     Regards,
>>      Rifaat
>>
>>
>>     On Thursday, December 3, 2020, Filip Skokan <panva...@gmail.com
>>     <mailto:panva...@gmail.com>> wrote:
>>
>>         To be clear, I'm not advocating to skip the registration,
>>         just wanted to mention a potential concern. If the process
>>         allows it and it will not introduce more delay to
>>         publication, I think we should go ahead and register the
>>         error code.
>>
>>         Best,
>>         *Filip*
>>
>>
>>         On Thu, 3 Dec 2020 at 11:06, Torsten Lodderstedt
>>         <tors...@lodderstedt.net <mailto:tors...@lodderstedt.net>> wrote:
>>
>>
>>
>>             > Am 03.12.2020 um 09:56 schrieb Filip Skokan
>>             <panva...@gmail.com <mailto:panva...@gmail.com>>:
>>             >
>>             > There are several documents already mentioning
>>             "invalid_redirect_uri" as an error code, specifically
>>             RFC7519 and OpenID Connect Dynamic Client Registration
>>             1.0. But these don't register it in the IANA OAuth
>>             Extensions Error Registry, presumably because they're
>>             neither for the authorization or token endpoints.
>>             >
>>             > While I think it'd be great if we had this error code
>>             registered, I also worry that its registration could
>>             confuse implementers to think it's okay to return it from
>>             the authorization endpoint.
>>
>>             I understand your concern. On the other hand, registering
>>             the error code is in my opinion the proper way forward.
>>             The registration is scoped to a usage location, should be
>>             pushed authorization endpoint then, and RFC6749 gives
>>             clear guidance on how to treat errors related to the
>>             redirect URI at the authorization endpoint.
>>
>>             "If the request fails due to a missing, invalid, or
>>             mismatching
>>                redirection URI, … authorization server ... MUST NOT
>>             automatically redirect the user-agent to the
>>                invalid redirection URI."
>>
>>             I think if an implementor ignores this, it will ignore
>>             any advise.
>>
>>             best regards,
>>             Torsten.
>>
>>             >
>>             > Best,
>>             > Filip
>>             >
>>             >
>>             > On Thu, 3 Dec 2020 at 00:29, Brian Campbell
>>             <bcampbell=40pingidentity....@dmarc.ietf.org
>>             <mailto:40pingidentity....@dmarc.ietf.org>> wrote:
>>             > During the course of a recent OIDF FAPI WG discussion
>>             (the FAPI profiles use PAR for authz requests) on this
>>             issue it was noted that there's no specific error code
>>             for problems with the redirect_uri (the example in
>>             
>> https://www.ietf.org/archive/id/draft-ietf-oauth-par-04.html#section-2.3
>>             even shows a general error code with mention of the
>>             redirect_uri not being valid in the error description).
>>             Some folks on that call thought it would be worthwhile to
>>             have a more specific error code for an invalid
>>             redirect_uri and I reluctantly took an action item to
>>             raise the issue here. At the time I'd forgotten that PAR
>>             had already passed WGLC. But it's been sitting idle while
>>             awaiting the shepherd writeup since mid September so it's
>>             maybe realistic to think the window for a small change is
>>             still open.
>>             >
>>             > Presumably nothing like an "invalid_redirect_uri" error
>>             code was defined in RFC 6749 because that class of errors
>>             could not be returned to the client via redirection. But
>>             the data flow in PAR would allow for a
>>             "invalid_redirect_uri" so it's not an unreasonable thing
>>             to do.
>>             >
>>             > As I write this message, however, I'm not personally
>>             convinced that it's worth making a change to PAR at this
>>             point. But I did say I'd bring the question up in the WG
>>             list and I'm just trying to be true to my word. So here
>>             it is. Please weigh in, if you have opinions on the matter.
>>             >
>>             >
>>             >
>>             > CONFIDENTIALITY NOTICE: This email may contain
>>             confidential and privileged material for the sole use of
>>             the intended recipient(s). Any review, use, distribution
>>             or disclosure by others is strictly prohibited.  If you
>>             have received this communication in error, please notify
>>             the sender immediately by e-mail and delete the message
>>             and any file attachments from your computer. Thank
>>             you._______________________________________________
>>             > OAuth mailing list
>>             > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>             > https://www.ietf.org/mailman/listinfo/oauth
>>             > _______________________________________________
>>             > OAuth mailing list
>>             > OAuth@ietf.org <mailto:OAuth@ietf.org>
>>             >
>>             
>> https://www.google.com/url?q=https://www.ietf.org/mailman/listinfo/oauth&source=gmail-imap&ust=1607590629000000&usg=AOvVaw3aW1gdv4EEiLmNYzlsJj-A
>>
>>
>
>     _______________________________________________
>     OAuth mailing list
>     OAuth@ietf.org <mailto:OAuth@ietf.org>
>     https://www.ietf.org/mailman/listinfo/oauth
>
>
> /CONFIDENTIALITY NOTICE: This email may contain confidential and
> privileged material for the sole use of the intended recipient(s). Any
> review, use, distribution or disclosure by others is strictly
> prohibited.  If you have received this communication in error, please
> notify the sender immediately by e-mail and delete the message and any
> file attachments from your computer. Thank you./ 

-- 
Vladimir Dzhuvinov

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to