On 3/2/23 3:51 PM, Vittorio Bertocci wrote:
Hi Robert,
thanks for your comments!
Some of the ideas you mention here were also touched upon during the AD review w Roman, the exchange we had might provide some context https://mailarchive.ietf.org/arch/msg/oauth/PBDCtVB7vtou5Dlz6nPJxX_5Yyo/ but more succinctly:

Why can't much of what you had to explain to Roman and then to me be put in the draft?

I think you have pretty good datapoints that the draft doesn't communicate your intent as you intend given those two points of feedback.

You can _acknowledge_ the questions and let designers/implementors know what your general thinking was without trying to fully specify behavior.


- "step down". One of the key reasons this spec exists is that the RS, and only the RS, is the arbiter of what's good enough for a request at a given moment. The exact same API call and exact same token that worked few seconds earlier (and still meets the requirements of a preceding challenge, including max_age) could be rejected later, and trigger a completely different set of requirements, for example as the result of black box logic executed by an anomaly detection engine on the API side. Neither the client nor the AS can know in advance whether a particular token will work again, all they can do is caching tokens according to the call circumstances they know (URL, call parameters etc) and hope it will work again, while remaining ready to receive and process a new challenge if it doesn't.

- Caching. Please see the discussion with Roman in the referenced thread, it should address the question.

- Nit: we'll remove the ref from the doc history on the next update :)

thanks
V.







On Thu, Mar 2, 2023 at 10:42 AM Robert Sparks via Datatracker <nore...@ietf.org> wrote:


      This message originated outside your organization.


    Reviewer: Robert Sparks
    Review result: Ready with Issues

    Summary: essentially ready but with issues to consider before
    being published
    as a proposed standard RFC.

    Issues:

    I expected to find some discussion of considerations of avoiding
    "step down"
    given the intuitive appeal to "step up". Can the client or
    Authorization server
    notice if the resource server has through whatever fault asserted
    that it will
    only accept the use of an authentication context class that is
    blatantly
    inferior to what has already been provided? And if they notice,
    what is
    expected to happen? Or is it expected that this is allowed,
    particularly when a
    short max_age is also supplied?

    The document also suggests that the client hold on to, and
    possibly re-use in
    the future, access tokens that have been challenged as having
    insufficient user
    authorization. Is this behavior something that follows a
    well-known and
    well-implemented pattern documented elsewhere? If so, a pointer
    would be
    useful. If not, this seems like something that deserves more
    discussion if not
    more definition.

    Nits:
    The reference to abr-twitter-reply will go away with the changelog
    when the RFC
    Editor removes it. It would be kind to acknowledge that in the
    note to the RFC
    Editor so that they know it's expected and don't have to ask.



    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org
    https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to