
From nobody Thu Dec  1 02:30:44 2016
Return-Path: <sberyozkin@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AC2C129624 for <oauth@ietfa.amsl.com>; Thu,  1 Dec 2016 02:30:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BKAqmnaQv7DP for <oauth@ietfa.amsl.com>; Thu,  1 Dec 2016 02:30:39 -0800 (PST)
Received: from mail-lf0-x229.google.com (mail-lf0-x229.google.com [IPv6:2a00:1450:4010:c07::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D1DDF12961C for <oauth@ietf.org>; Thu,  1 Dec 2016 02:30:38 -0800 (PST)
Received: by mail-lf0-x229.google.com with SMTP id b14so167889534lfg.2 for <oauth@ietf.org>; Thu, 01 Dec 2016 02:30:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding; bh=FoKbMBQgrhwSaVYaiTgowbsBAIe4vXCx1pKJymA07ck=; b=iJnIg3FrvucqEEA17+vUF1+jq5zZLf1NcXt5PHd1ysXCWOKp3mu44/ldMXt95+twQO I94Bf6QFF+IkFMgXq6HZSF3RWlniKQKmW8ljZbeTfxAxIy+9zJ1F/WWH+vMNamuuLmA0 LA6TAjzo7u40h5A9253rTVIRJEFV9Oy3mkhXxHhwDeNcyLgO8vWM718xp4gJ62hwf+eZ SoJznbAgIkbrMvtrZ9fw+zP9Rv1d5uwzzlxsGzA0rikMLCaADy/5k9hRgyki4iuZKOF4 oqOzt2IbIWf7xX2eaf9ZErJ9KOVvJDx8O1JxcK1YvjrHDvn0mCggGLkc5R7GW0bbRGFI 5lJw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=FoKbMBQgrhwSaVYaiTgowbsBAIe4vXCx1pKJymA07ck=; b=Qc4k4rm1PKFtQhXDUT4z/9m7Rzo+lq+cjzebZGPQsWALGnGuS5BpTUclzI/raBpjni M6+fp3N+GvW6KGC1c63S32LM4TvWDaPKdvwVBwvl0b2cB/PQlu68zU9hPmz5753mmMuX I7keIwXa3lL324g6aCuZhtvUO17qK7TSPDOHVSuWhpwsQyF3mmvIWuKyCcNd3Ijnm5kG EoETPOtjkxkkzxJbnKybAt+NSsfIGufC7JdzWNhDmLTNhFKzDZPC/GuUKrBF2Oh9zR2M Nm9w0pdb3APv8cabfK0nvVHz+GVL6zHnjwN99uIcI9/Pax0XBq1+JQb1Cd3t7p3ctasK huHg==
X-Gm-Message-State: AKaTC02lIXK0FObFDghty0REKaUSeDPvPxeyxlSxS34Rlf/8aMEJ+vVB1wXPqLVDWKrqYw==
X-Received: by 10.46.72.2 with SMTP id v2mr12075898lja.67.1480588236602; Thu, 01 Dec 2016 02:30:36 -0800 (PST)
Received: from [192.168.2.7] ([79.97.121.181]) by smtp.googlemail.com with ESMTPSA id v26sm15199137lja.30.2016.12.01.02.30.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 01 Dec 2016 02:30:35 -0800 (PST)
To: John Bradley <ve7jtb@ve7jtb.com>, Justin Richer <jricher@mit.edu>
References: <c607334a-edcd-2be6-1796-7b31e070bad0@gmail.com> <BFE837C1-C2A8-4393-A6E1-3F56E45AC12C@mit.edu> <CD883FC7-531B-4BDF-91FF-33F0FBC102BD@ve7jtb.com> <6c46d3a4-ad0d-3b49-7a15-7532634702e9@gmail.com>
From: Sergey Beryozkin <sberyozkin@gmail.com>
Message-ID: <e93b42c4-888a-0315-19b8-2aedab6227b2@gmail.com>
Date: Thu, 1 Dec 2016 10:30:34 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <6c46d3a4-ad0d-3b49-7a15-7532634702e9@gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/mRhrA0jzzwU9u_pNeOLvFEbAacA>
Cc: "<oauth@ietf.org>" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Dynamic client registration and the audience (resource) indicators
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Dec 2016 10:30:41 -0000

Hi,
We'll experiment with starting supporting a "resource_uris" extension 
array property - the name is based on a 'resource' indicator property 
from the resource indicators draft, with a '_uris' added given that many 
dynamic registration properties have similar suffixes

Cheers, Sergey
On 29/11/16 10:49, Sergey Beryozkin wrote:
> Hi John, All
>
> I've been alway thinking that the reason an audience can be an array (as
> indicated for ex by the JWT spec, etc) is because a client application
> may need to talk to more than one RS in order to complete a single
> action for the current user (ex, the client will not talk to either RS1
> or RS2 but first to RS1 and then will complete the action by talking to
> RS2).
>
> Why else would a JWT access token have an array of audience values ?
> https://tools.ietf.org/html/rfc7519#section-4.1.3
>
> I agree the resource indicators can help on its own - in case no
> audiences for a given client have been pre-registered or as you
> suggested - to point to a specific resource at the runtime, with this
> (resource) URI being validated against the pre-registered values.
>
> But also, pre-registering a single audience during the client
> registration (dynamic or static) can minimize the need to use the
> resource indicators at the runtime.
>
> I did not quite understand what you were explaining about registering
> RSs with the client - I guess that client will know in advance which
> RS(s) it will need to talk to do its work,
>
> Many thanks, Sergey
>
>
>
>
> On 28/11/16 22:58, John Bradley wrote:
>> To make something like this work with a loose coupling between the RS
>> and AS the format of the AT would also need to be specified.
>>
>> To this point the WG has avoided standardizing AT.
>>
>> Most AS probably believe they know what RS the token is going to be
>> used at based on scopes.
>> Taking those tokens and using them at other RS is arguably at-least
>> out of scope or arguably not allowed by the current specs.
>>
>> People are perhaps abusing the specs and sending AT to RS that are not
>> properly audienced and can be replayed between RS.
>> This is really bad from a security perspective with bearer tokens.
>>
>> I do however see a valid use case.
>>
>> Registering RS with the client is not a bad idea, however if you
>> register more than one without the client saying at runtime what RS
>> the token is for they can still be replayed.
>> The client depending on design could still be tricked by a RS or
>> something else to get a token audienced to a different RS if the AS
>> dosen't know where the client is sending the token.
>>
>> I donâ€™t think registering RS gets around the need for the resource
>> indicator draft
>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators
>>
>> Typically we have thought about a tight coupling between the RS and
>> AS,  but now it seems people are putting more of the
>> intelligence/burden on the the client.
>>
>> in a more dynamic system the RS might provide a list of AS that it
>> accepts tokens form and the client might dynamically register with one
>> of them.
>>
>> I suspect Sergeyâ€™s AS is doing something in between.
>>
>> I am hesitant to pick off just dynamic registration as there are a
>> number of interrelated issues that need to be thought through to
>> prevent security issues.
>>
>> John B.
>>
>>
>>
>>
>>
>>
>>> On Nov 28, 2016, at 3:47 PM, Justin Richer <jricher@mit.edu> wrote:
>>>
>>> I would consider that a totally reasonable extension. You will need
>>> to define what the behavior is if the client doesnâ€™t provide a value
>>> for that field: is there a default? Are there no resources available
>>> to the client?
>>>
>>> â€” Justin
>>>
>>>> On Nov 28, 2016, at 12:21 PM, Sergey Beryozkin
>>>> <sberyozkin@gmail.com> wrote:
>>>>
>>>> Hi All
>>>>
>>>> Our AS allows for the manual client registration with the UI
>>>> offering an option to assign the audience/resource URIs to a given
>>>> Client registration with all the associated future access tokens
>>>> inheriting them.
>>>>
>>>> The client will not have to follow the resource indicator
>>>> registration as recommended at [1] - the administrator who registers
>>>> the clients sets the audiences.
>>>>
>>>> We'd like to achieve the same with the dynamic client registration
>>>> but my colleague noted the client metadata in the dynamic
>>>> registration request has no 'audience' property.
>>>>
>>>> We will consider supporting either an 'audience' or 'resource'
>>>> property - does it sound reasonable ?
>>>>
>>>> By the way, as far as [1] is concerned, should a 'resource' property
>>>> support an array of audiences ? (To support a case a client needed
>>>> to talk to several RSs to complete a given action)
>>>>
>>>> Thanks, Sergey
>>>>
>>>> [1]
>>>> https://tools.ietf.org/html/draft-campbell-oauth-resource-indicators-02
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>
>


From nobody Fri Dec  9 11:54:54 2016
Return-Path: <jim@manicode.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 00DF7129634 for <oauth@ietfa.amsl.com>; Fri,  9 Dec 2016 11:54:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=manicode-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id odF5fNnU_EZe for <oauth@ietfa.amsl.com>; Fri,  9 Dec 2016 11:54:51 -0800 (PST)
Received: from mail-wm0-x22e.google.com (mail-wm0-x22e.google.com [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C6EA412969E for <oauth@ietf.org>; Fri,  9 Dec 2016 11:54:50 -0800 (PST)
Received: by mail-wm0-x22e.google.com with SMTP id f82so36606510wmf.1 for <oauth@ietf.org>; Fri, 09 Dec 2016 11:54:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=manicode-com.20150623.gappssmtp.com; s=20150623; h=to:from:subject:message-id:date:user-agent:mime-version; bh=2I2aOtol1yjfffmuxlEAP+jEvVb4JRt4QOsDOHSbWos=; b=CAT5Z3VD7QgLqoIAlccuBDHS2/svIJ4JO9L/TFnE5anaTlGhStOizI3mK9EXfKSCvf GLm75/17ZxKwAor1J0xcqlh3l9ZrNIBREje6T1JrgyY/pL3SuiPlXqtULVUbIpxPeW8r UnlAtTySwrHVcrF0pVN+I8OKFfd977d6R2O9051zWQxLF1/I6ee+9EMAneUDghMmn0FG tp7KwC43E00yr9A6G8T/ykeybeNTTGov2LDLNEYMx4gAcEC/BVPe0k7jxa+6VgrHgX3V P1kwxfCRgIUQl1lVjE21/rjGvXk1ldkr3NNikDnPnDSiLStC5NRh3ByyQAifsLoy/Tx4 xV6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:to:from:subject:message-id:date:user-agent :mime-version; bh=2I2aOtol1yjfffmuxlEAP+jEvVb4JRt4QOsDOHSbWos=; b=nHYNZt1JMhTDObu/Os++8k5XvFHZ3BtfWuDqjDFkJBQFc0VPrl97sHLcBZakhnPuI2 zWAgH9SLAKl8ZtelxERXPhhGDhukOzvekSm14CnUyl3mYezXta4TJZ7mOSyuhHdnrV9J woCXNXlwpqaSYjdtXeiyGeZj6ub7EKNXSls7c0tf69JQt04Ybw29MOUpJkTLG+9NPHpf Vu/mTRPyN2Rag5LfAjf0/zZiY9Fc0jP3J0CYJUCIX8H3NGWwMQRri2AMCSg5c5PXPM3R eY/al7vXwg6nb9i8AMaitdGxkJ3kb4kqNrOcryCRFLyFgVzIFpdlK1AlUteor8JJLwFa 1M6w==
X-Gm-Message-State: AKaTC03AKP/u4X50t0H+uoC1aRiVp0Y+heBRbga8oGjpQaEf/Sdd6H3XVLEwNF+0vX1/2Lzm
X-Received: by 10.28.137.81 with SMTP id l78mr34552wmd.36.1481313288946; Fri, 09 Dec 2016 11:54:48 -0800 (PST)
Received: from heembo.local (36.42.158.77.rev.sfr.net. [77.158.42.36]) by smtp.googlemail.com with ESMTPSA id l67sm22087630wmf.20.2016.12.09.11.54.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 09 Dec 2016 11:54:48 -0800 (PST)
To: OAuth WG <oauth@ietf.org>, Torsten Lodderstedt <torsten@lodderstedt.net>
From: Jim Manico <jim@manicode.com>
Message-ID: <523660d6-b535-4877-2653-78be3c01b881@manicode.com>
Date: Fri, 9 Dec 2016 20:54:47 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.5.1
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="------------36619E6CAF0B4B16AAEECC45"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/U97-oR8YDc3szDKoGuH7FDMKhn4>
Subject: [OAUTH-WG] OAuth Tokens and URI's
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Dec 2016 19:54:53 -0000

This is a multi-part message in MIME format.
--------------36619E6CAF0B4B16AAEECC45
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Torsten,

The
https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security-topics/=
?include_text=3D1
guide you are working on is a special kind of magic. Thank you for
taking the time to write this very important document.

When it comes to 2.2.1, I see your great suggestion to prevent referrer
leakage. These defenses are very important, and I appreciate how clearly
you laid these out.

But I think they skip the really core problem that web security
solutions must embrace - which I believe to be, /do not put sensitive
data in URL/GET parameters/. This goes all the way back to RFC 2616
#9.1.1: "the GET and HEAD methods SHOULD NOT have the significance of
taking an action other than retrieval" which I feel implies "should not
do anything dangerous" including transport sensitive data.

OAuth 2 goes pretty wild - all the way - with putting very sensitive
tokens in URIs/URLs and I have seen some solutions that break the
"standard" and POST/PUT/PATCH when they can, keeping tokens out of POST
actions, URL's and similar.  Is this worth discussing?

Thank you again for this very important and well written document.

Aloha from Hawaii,

--=20
Jim Manico
Manicode Security
https://www.manicode.com


--------------36619E6CAF0B4B16AAEECC45
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Torsten,<br>
    <br>
    The
<a class="moz-txt-link-freetext" href="https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security-topics/?include_text=1">https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security-topics/?include_text=1</a>
    guide you are working on is a special kind of magic. Thank you for
    taking the time to write this very important document.<br>
    <br>
    When it comes to 2.2.1, I see your great suggestion to prevent
    referrer leakage. These defenses are very important, and I
    appreciate how clearly you laid these out.<br>
    <br>
    But I think they skip the really core problem that web security
    solutions must embrace - which I believe to be, <i>do not put
      sensitive data in URL/GET parameters</i>. This goes all the way
    back to RFC 2616 #9.1.1: "the GET and HEAD methods SHOULD NOT have
    the significance of taking an action other than retrieval" which I
    feel implies "should not do anything dangerous" including transport
    sensitive data.
    <br>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
    <br>
    <meta name="ProgId" content="PowerPoint.Slide">
    <meta name="Generator" content="Microsoft PowerPoint 15">
    <!--StartFragment-->
    <span style="font-size:12.0pt"><span
        style="mso-special-format:bullet;font-family:Arial">OAuth 2 goes
        pretty wild - all the way - with putting very sensitive tokens
        in URIs/URLs and I have seen some solutions that break the
        "standard" and POST/PUT/PATCH when they can, keeping tokens out
        of POST actions, URL's and similar.Â  Is this worth discussing? <br>
        <br>
        Thank you again for this very important and well written
        document.<br>
        <br>
        Aloha from Hawaii,<br>
      </span></span>
    <pre class="moz-signature" cols="72">-- 
Jim Manico
Manicode Security
<a class="moz-txt-link-freetext" href="https://www.manicode.com">https://www.manicode.com</a></pre>
  </body>
</html>

--------------36619E6CAF0B4B16AAEECC45--


From nobody Fri Dec  9 11:58:51 2016
Return-Path: <jim@manicode.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F5BB129548 for <oauth@ietfa.amsl.com>; Fri,  9 Dec 2016 11:58:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=manicode-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x3OsDUQNMxzZ for <oauth@ietfa.amsl.com>; Fri,  9 Dec 2016 11:58:47 -0800 (PST)
Received: from mail-wj0-x229.google.com (mail-wj0-x229.google.com [IPv6:2a00:1450:400c:c01::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00BBC1296A7 for <oauth@ietf.org>; Fri,  9 Dec 2016 11:58:46 -0800 (PST)
Received: by mail-wj0-x229.google.com with SMTP id tg4so23204134wjb.1 for <oauth@ietf.org>; Fri, 09 Dec 2016 11:58:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=manicode-com.20150623.gappssmtp.com; s=20150623; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to; bh=Umql7fr5QS+X5mq/su4MQqGwXYTrh+nWU+MxtuelDsc=; b=L2qOXwZn5LASSOMlxaiUAWdYqhvdObthfnlZzFliutdNeEcGv4eKM0V+f75ULMvuCL bgiZj/oZBlUNJcCrV55MMOh2xGgq1z+kaByzHEZc70WYK6IgXfq+uOeqnyUMQll9+y78 f7GF30Fns6A4Uh+BFjYlx67Jl9YOz9eE2X6Y207dP0Ea20vnayA5C6d7fnCXQnKNzOp9 pllQkflgpAkWOl3m3BulVCIiVilOzwYqH8a8RywZRaP39qOj4s+retINrl2pfQOA+W1d Dxaj6qFvsNNrEnUtunrfAH42txWXyCMCd4DYo2SVaVdrGmeauVdTKHJE+j1n7bw9Z7h/ z0Ww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to; bh=Umql7fr5QS+X5mq/su4MQqGwXYTrh+nWU+MxtuelDsc=; b=Dg8plJzv45s7h5GicWcBM8XsUq8Vnz57hhMockig3h32eIICE+QQ5uBdzws2DvZGU6 +XRFvDstPqNbxyltmWmOpUuslmt2In+jcOde4r/eJZ4aKGVNH8a1HmhmCUP/BIzvTzAC hlpjdT/UTwJY/U4/t0j92WpgWJNiLZcWo7zdSKAF3y+VV8hnrE2Rb5p0mSEOQKJq3aAF OLvsnxSGEZhOOmZ3CJtynoPcZ9cGeTDwCpqSgWNR0qXtyEunt7jN/8x4JM2Mg2NBPDCS c/nrnNuJLpeNnyzL2Ez1Tc8Ximb/ILck2g0L8Erq1cWIXBBFdXc6dTuyeKmVqua6+rD3 crnQ==
X-Gm-Message-State: AKaTC00CqEGHHJGlh9UTUa2ZTsvTqSSt8U/gVJJsu41h0C8u9LfscGxDOZyMxlZbIbmm1NbT
X-Received: by 10.194.246.170 with SMTP id xx10mr50877841wjc.174.1481313525304;  Fri, 09 Dec 2016 11:58:45 -0800 (PST)
Received: from heembo.local (36.42.158.77.rev.sfr.net. [77.158.42.36]) by smtp.googlemail.com with ESMTPSA id l6sm22196203wmd.5.2016.12.09.11.58.43 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 09 Dec 2016 11:58:44 -0800 (PST)
To: OAuth WG <oauth@ietf.org>, Torsten Lodderstedt <torsten@lodderstedt.net>
References: <523660d6-b535-4877-2653-78be3c01b881@manicode.com>
From: Jim Manico <jim@manicode.com>
Message-ID: <583e6e3c-51dd-db2c-6e41-cb8255ff45d1@manicode.com>
Date: Fri, 9 Dec 2016 20:58:43 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.5.1
MIME-Version: 1.0
In-Reply-To: <523660d6-b535-4877-2653-78be3c01b881@manicode.com>
Content-Type: multipart/alternative; boundary="------------8B499BBEF4382A0D107CEC57"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/OD5qzgB6lN9Ka0k-eMMCaygqfdY>
Subject: Re: [OAUTH-WG] OAuth Tokens and URI's
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Dec 2016 19:58:49 -0000

This is a multi-part message in MIME format.
--------------8B499BBEF4382A0D107CEC57
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

... One more note. You mentioned in this section...

   o  Use form post mode instead of redirect for authorization response

.. This might be worth expanding on./Use form post and keep data OUT OF
THE ACTION/ (which is essentially the same as a GET). Safe transport of
tokens includes well configured HTTPS, POST and other verbs, and data
being the body of the request, not in the action of a form. Fair?

(And sorry, I missed this one the first time around)

Aloha, Jim

On 12/9/16 8:54 PM, Jim Manico wrote:
> Torsten,
>
> The
> https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security-topics/?include_text=1
> guide you are working on is a special kind of magic. Thank you for
> taking the time to write this very important document.
>
> When it comes to 2.2.1, I see your great suggestion to prevent
> referrer leakage. These defenses are very important, and I appreciate
> how clearly you laid these out.
>
> But I think they skip the really core problem that web security
> solutions must embrace - which I believe to be, /do not put sensitive
> data in URL/GET parameters/. This goes all the way back to RFC 2616
> #9.1.1: "the GET and HEAD methods SHOULD NOT have the significance of
> taking an action other than retrieval" which I feel implies "should
> not do anything dangerous" including transport sensitive data.
>
> OAuth 2 goes pretty wild - all the way - with putting very sensitive
> tokens in URIs/URLs and I have seen some solutions that break the
> "standard" and POST/PUT/PATCH when they can, keeping tokens out of
> POST actions, URL's and similar.  Is this worth discussing?
>
> Thank you again for this very important and well written document.
>
> Aloha from Hawaii,
> -- 
> Jim Manico
> Manicode Security
> https://www.manicode.com

-- 
Jim Manico
Manicode Security
https://www.manicode.com


--------------8B499BBEF4382A0D107CEC57
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=utf-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <p>... One more note. You mentioned in this section...</p>
    <p>
      <meta name="Title" content="">
    </p>
    <p>
      <meta name="Keywords" content="">
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
      <meta name="ProgId" content="Word.Document">
      <meta name="Generator" content="Microsoft Word 15">
      <meta name="Originator" content="Microsoft Word 15">
      <link rel="File-List"
href="file://localhost/Users/jmanico/Library/Group%20Containers/UBF8T346G9.Office/msoclip1/01/clip_filelist.xml">
      <!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:AllowPNG/>
  <o:PixelsPerInch>96</o:PixelsPerInch>
 </o:OfficeDocumentSettings>
</xml><![endif]-->
      <link rel="themeData"
href="file://localhost/Users/jmanico/Library/Group%20Containers/UBF8T346G9.Office/msoclip1/01/clip_themedata.thmx">
      <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:TrackMoves/>
  <w:TrackFormatting/>
  <w:PunctuationKerning/>
  <w:ValidateAgainstSchemas/>
  <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
  <w:IgnoreMixedContent>false</w:IgnoreMixedContent>
  <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
  <w:DoNotPromoteQF/>
  <w:LidThemeOther>EN-US</w:LidThemeOther>
  <w:LidThemeAsian>JA</w:LidThemeAsian>
  <w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
  <w:Compatibility>
   <w:BreakWrappedTables/>
   <w:SnapToGridInCell/>
   <w:WrapTextWithPunct/>
   <w:UseAsianBreakRules/>
   <w:DontGrowAutofit/>
   <w:SplitPgBreakAndParaMark/>
   <w:EnableOpenTypeKerning/>
   <w:DontFlipMirrorIndents/>
   <w:OverrideTableStyleHps/>
  </w:Compatibility>
  <m:mathPr>
   <m:mathFont m:val="Cambria Math"/>
   <m:brkBin m:val="before"/>
   <m:brkBinSub m:val="&#45;-"/>
   <m:smallFrac m:val="off"/>
   <m:dispDef/>
   <m:lMargin m:val="0"/>
   <m:rMargin m:val="0"/>
   <m:defJc m:val="centerGroup"/>
   <m:wrapIndent m:val="1440"/>
   <m:intLim m:val="subSup"/>
   <m:naryLim m:val="undOvr"/>
  </m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="382">
  <w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"/>
  <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"/>
  <w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"/>
  <w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"/>
  <w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"/>
  <w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"/>
  <w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"/>
  <w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"/>
  <w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"/>
  <w:LsdException Locked="false" Priority="39" Name="Table Grid"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 1"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 2"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 3"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 4"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 5"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 7"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 8"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Level 9"/>
  <w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"/>
  <w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"/>
  <w:LsdException Locked="false" SemiHidden="true" Name="Revision"/>
  <w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"/>
  <w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"/>
  <w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"/>
  <w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"/>
  <w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"/>
  <w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"/>
  <w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"/>
  <w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"/>
  <w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"/>
  <w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"/>
  <w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"/>
  <w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"/>
  <w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"/>
  <w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"/>
  <w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"/>
  <w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"/>
  <w:LsdException Locked="false" Priority="41" Name="Plain Table 1"/>
  <w:LsdException Locked="false" Priority="42" Name="Plain Table 2"/>
  <w:LsdException Locked="false" Priority="43" Name="Plain Table 3"/>
  <w:LsdException Locked="false" Priority="44" Name="Plain Table 4"/>
  <w:LsdException Locked="false" Priority="45" Name="Plain Table 5"/>
  <w:LsdException Locked="false" Priority="40" Name="Grid Table Light"/>
  <w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"/>
  <w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"/>
  <w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"/>
  <w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"/>
  <w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"/>
  <w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"/>
  <w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"/>
  <w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"/>
  <w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"/>
  <w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"/>
  <w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"/>
  <w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"/>
  <w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"/>
  <w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"/>
  <w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"/>
  <w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"/>
  <w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"/>
  <w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"/>
 </w:LatentStyles>
</xml><![endif]-->
      <style>
<!--
 /* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;
	mso-font-charset:1;
	mso-generic-font-family:roman;
	mso-font-format:other;
	mso-font-pitch:variable;
	mso-font-signature:0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;
	mso-font-charset:0;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:-536870145 1073786111 1 0 415 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-unhide:no;
	mso-style-qformat:yes;
	mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:Calibri;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:Calibri;
	mso-fareast-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-default-props:yes;
	font-family:Calibri;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:Calibri;
	mso-fareast-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-paper-source:0;}
div.WordSection1
	{page:WordSection1;}
-->
</style><!--[if gte mso 10]>
<style>
 /* Style Definitions */
table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:Calibri;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->
      <!--StartFragment-->
      <p class="MsoNormal"><span style="mso-spacerun:yes">Â Â  </span>o<span
          style="mso-spacerun:yes">Â  </span>Use form post mode instead
        of redirect for
        authorization response<o:p></o:p></p>
      <!--EndFragment-->
    </p>
    .. This might be worth expanding on.<i> Use form post and keep data
      OUT OF THE ACTION</i> (which is essentially the same as a GET).
    Safe transport of tokens includes well configured HTTPS, POST and
    other verbs, and data being the body of the request, not in the
    action of a form. Fair?<br>
    <br>
    (And sorry, I missed this one the first time around)<br>
    <br>
    Aloha, Jim<br>
    <br>
    <div class="moz-cite-prefix">On 12/9/16 8:54 PM, Jim Manico wrote:<br>
    </div>
    <blockquote
      cite="mid:523660d6-b535-4877-2653-78be3c01b881@manicode.com"
      type="cite">
      <meta http-equiv="content-type" content="text/html; charset=utf-8">
      Torsten,<br>
      <br>
      The
      <a moz-do-not-send="true" class="moz-txt-link-freetext"
href="https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security-topics/?include_text=1">https://datatracker.ietf.org/doc/draft-lodderstedt-oauth-security-topics/?include_text=1</a>
      guide you are working on is a special kind of magic. Thank you for
      taking the time to write this very important document.<br>
      <br>
      When it comes to 2.2.1, I see your great suggestion to prevent
      referrer leakage. These defenses are very important, and I
      appreciate how clearly you laid these out.<br>
      <br>
      But I think they skip the really core problem that web security
      solutions must embrace - which I believe to be, <i>do not put
        sensitive data in URL/GET parameters</i>. This goes all the way
      back to RFC 2616 #9.1.1: "the GET and HEAD methods SHOULD NOT have
      the significance of taking an action other than retrieval" which I
      feel implies "should not do anything dangerous" including
      transport sensitive data. <br>
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
      <br>
      <meta name="ProgId" content="PowerPoint.Slide">
      <meta name="Generator" content="Microsoft PowerPoint 15">
      <!--StartFragment--> <span style="font-size:12.0pt"><span
          style="mso-special-format:bullet;font-family:Arial">OAuth 2
          goes pretty wild - all the way - with putting very sensitive
          tokens in URIs/URLs and I have seen some solutions that break
          the "standard" and POST/PUT/PATCH when they can, keeping
          tokens out of POST actions, URL's and similar.Â  Is this worth
          discussing? <br>
          <br>
          Thank you again for this very important and well written
          document.<br>
          <br>
          Aloha from Hawaii,<br>
        </span></span>
      <pre class="moz-signature" cols="72">-- 
Jim Manico
Manicode Security
<a moz-do-not-send="true" class="moz-txt-link-freetext" href="https://www.manicode.com">https://www.manicode.com</a></pre>
    </blockquote>
    <br>
    <pre class="moz-signature" cols="72">-- 
Jim Manico
Manicode Security
<a class="moz-txt-link-freetext" href="https://www.manicode.com">https://www.manicode.com</a></pre>
  </body>
</html>

--------------8B499BBEF4382A0D107CEC57--


From nobody Sun Dec 11 16:33:12 2016
Return-Path: <leadszoneusa@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AAF41297CA; Sun, 11 Dec 2016 16:33:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DTMgsbZCehUt; Sun, 11 Dec 2016 16:33:08 -0800 (PST)
Received: from mail-wm0-x243.google.com (mail-wm0-x243.google.com [IPv6:2a00:1450:400c:c09::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 629D912953A; Sun, 11 Dec 2016 16:33:08 -0800 (PST)
Received: by mail-wm0-x243.google.com with SMTP id a20so7838615wme.2; Sun, 11 Dec 2016 16:33:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:from:date:message-id:subject:to; bh=x5nr8dNoftZuu6a25ZwnCH+Bzzhag+gJJCgKLOQY8ck=; b=P0C/IQfe/iWmk0ilmrm3ecTWYGa4RY9lEYmMOHGOASvwt51KfGhUxwYdgE+bzPmR+R ODyQaiPjgy+wbwTbw+IHe16l1Kw20KNmzVQBQ9el70Rrg2q8eO3wFnQlRFKHKn/NpIbg E6abTBg3izAeqHz0qGHyJ46Mf/4JxUxknoKunMO+0PqSUGHki3x10E41Scr5f0RegGfy FrPnHc2kXIAN2BvjicKlQMAYn3ITRmPL7bFttcOvCoaMiWPeNqqT4SZTqHZr7GxgIz4a QkB3GYln02uuVnuV9Q/2iMOD7RpWIjpSf/1cZbY0HrjX5uaqcIXGEivcVGpdbKtxcLoG uDHA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=x5nr8dNoftZuu6a25ZwnCH+Bzzhag+gJJCgKLOQY8ck=; b=U7boBMoAaYIdAldwiAU/2gSWszlBtbmeYbwjCMbMdSC4VRXlva439lYg31gpMpDzYD CnmwjG+f4jNyOYrpKJQawDW9XDz0F+kBMCs8koF4XCmzwY+IglVeaZHFZ8kZbQP8+uYF dfH+i9+zYRltpQT6N49YkYRJcWbJ1fcXMLokS4WjvAq24qL/Ky2mV7kHyTgsecUCSj2O xHLruHPjGUdgxkL5w4rUpxOvFXP6bw9ykQew0fbCLchNvIvfkXj43ZgrmBXlTMDsYDxn hqsPWGNXIVnbmT+ZpVh0yWUwgcl+XqA6ikDEfuaujxJ3jR+nZ1LgfdAgTtjdQ7SneNg3 rAzQ==
X-Gm-Message-State: AKaTC01MAxXHTU7I5KDuembX6h30PF+awfNxZo9ER9X5+RpVhgZM+/z6JFy7/YMw6Sd9gWk4D6/zn7kbpoBYcA==
X-Received: by 10.28.166.208 with SMTP id p199mr6593955wme.27.1481502786934; Sun, 11 Dec 2016 16:33:06 -0800 (PST)
MIME-Version: 1.0
Received: by 10.28.129.74 with HTTP; Sun, 11 Dec 2016 16:33:06 -0800 (PST)
From: Leads Zone <leadszoneusa@gmail.com>
Date: Mon, 12 Dec 2016 06:33:06 +0600
Message-ID: <CAHJ98Ndzh-qSaD=Y6y=5pYY_s3rO4FGppV2HBm29erUVB_cAyg@mail.gmail.com>
To: glorialevell glorialevell <glorialevellg@yahoo.com>, The Guardian <info@mail.theguardian.com>,  leadszoneusa <craigslist_leads@outlook.com>, leadszoneusa <leadszoneusa@gmail.com>,  leadszoneusa <craigslist_leads@yahoo.com>, Louise Meyers <louisemeyers21@gmail.com>,  oauth-request@ietf.org, OAuth@ietf.org, Willis Jones <tgb.llc.5@gmail.com>
Content-Type: multipart/alternative; boundary=94eb2c12cad05960a505436b3f11
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/_83RUe2-FbRDXm-5QGLIu8UHuxw>
Subject: [OAUTH-WG] Craigslist posting and resume is available here for sale.
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Dec 2016 00:33:10 -0000

--94eb2c12cad05960a505436b3f11
Content-Type: text/plain; charset=UTF-8

-- 
Craigslist leads generation here


Posting category :


           ##Jobs
           ##Housing
  ##customer- services
  ##General-labor
  ##Gigs-labor
  ##Personal advertisement for sell.


Connect with us :

skype id :  leads.zone

outlook id: craigslist_leads@outlook.com

yahoo Id: craigslist_leads@yahoo.com

Gmail Id : leadszoneusa@gmail.com

--94eb2c12cad05960a505436b3f11
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br clear=3D"all"><div><br></div>-- <br><div class=3D"gmai=
l_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr"><div>Craig=
slist leads generation here<br></div><div><br></div><div><br></div><div><di=
v>Posting category :</div><div><br></div><div><br></div><div>=C2=A0 =C2=A0 =
=C2=A0 =C2=A0 =C2=A0 =C2=A0##Jobs=C2=A0</div><div>=C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0##Housing=C2=A0</div><div><span style=3D"white-space:pre">=
	</span> =C2=A0 ##customer- services</div><div><span style=3D"white-space:p=
re">	</span> =C2=A0 ##General-labor</div><div><span style=3D"white-space:pr=
e">	</span> =C2=A0 ##Gigs-labor</div><div><span style=3D"white-space:pre">	=
</span> =C2=A0 ##Personal advertisement for sell.</div></div><div><br></div=
><div><br></div><div>Connect with us :</div><div><br></div><div>skype id : =
=C2=A0leads.zone</div><div><br></div><div>outlook id: <a href=3D"mailto:cra=
igslist_leads@outlook.com" target=3D"_blank">craigslist_leads@outlook.com</=
a></div><div><br></div><div>yahoo Id: <a href=3D"mailto:craigslist_leads@ya=
hoo.com" target=3D"_blank">craigslist_leads@yahoo.com</a></div><div><br></d=
iv><div>Gmail Id : <a href=3D"mailto:leadszoneusa@gmail.com" target=3D"_bla=
nk">leadszoneusa@gmail.com</a></div></div></div>
</div>

--94eb2c12cad05960a505436b3f11--


From nobody Wed Dec 21 05:37:24 2016
Return-Path: <denis.ietf@free.fr>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CB6A1296AB for <oauth@ietfa.amsl.com>; Wed, 21 Dec 2016 05:37:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJyGhhV0FXsU for <oauth@ietfa.amsl.com>; Wed, 21 Dec 2016 05:37:19 -0800 (PST)
Received: from smtp6-g21.free.fr (smtp6-g21.free.fr [IPv6:2a01:e0c:1:1599::15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DF7712959D for <oauth@ietf.org>; Wed, 21 Dec 2016 05:37:14 -0800 (PST)
Received: from [192.168.0.13] (unknown [88.182.125.39]) by smtp6-g21.free.fr (Postfix) with ESMTP id 6DA097803A4 for <oauth@ietf.org>; Wed, 21 Dec 2016 14:37:12 +0100 (CET)
To: oauth@ietf.org
References: <f5f049b9-1aca-9949-ffd6-c9ce1396ef31@free.fr>
From: Denis <denis.ietf@free.fr>
Message-ID: <97ba9e08-6179-3157-1017-c616c42ba64f@free.fr>
Date: Wed, 21 Dec 2016 14:37:18 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1
MIME-Version: 1.0
In-Reply-To: <f5f049b9-1aca-9949-ffd6-c9ce1396ef31@free.fr>
Content-Type: multipart/alternative; boundary="------------9E3D0D6DEF50FB8617116055"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/I4g6IqNMyCkVlEXFeBFCHfAq--s>
Subject: [OAUTH-WG] Comments on draft-ietf-oauth-token-binding-01
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Dec 2016 13:37:22 -0000

This is a multi-part message in MIME format.
--------------9E3D0D6DEF50FB8617116055
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit


There has been a WGLC in the Token Binding (tokbind) WG about the 
following documents:

   draft-ietf-tokbind-protocol
   draft-ietf-tokbind-https
   draft-ietf-tokbind-negotiation

I have posted the following comments:

    This set of documents failed to meet the terms of references of the
    WG charter.

    It is not resistant to the ABC attack (Alice and Bob collusion attack).

    In this attack Bob who is older than 18 colloborates with Alice and
    transmits a token to Alice
    who is only 14 so that she can demonstrate to a RS that she is older
    than 18.

    This kind of attack is not even mentionned in the security
    considerations section.


========================================================================

There are two options:

*Option A*: drop this series of documents, i.e. :

   draft-ietf-tokbind-protocol
   draft-ietf-tokbind-https
   draft-ietf-tokbind-negotiation

or
**

*Option B*: clearly mention that the ABC attack cannot be countered 
using TLS binding.

In case, the latter decision would be taken by the tokbind WG, I have 
proposed a few text replacements.

*1 - *In *draft-ietf-tokbind-protocol*, change the abstract in the 
following way
(and modify the content of the document in accordance):

This document specifies Version 1.0 of the Token Binding protocol. The 
Token Binding protocol allows client/server applications tocreate 
long-lived, uniquely identifiable TLS [RFC5246 
<https://tools.ietf.org/html/rfc5246>] bindingsspanning multiple TLS 
sessions and connections.Applications arethen enabled to 
cryptographically bind security tokens to the TLSlayer. *However, the 
binding a security token to a TLS connection **is unable to counter collaboration attacks between two clients **since one client can compute the necessary information for the **other client without the need to release his key(s) to the other **client.For an effective protection against collaboration attacks, **an appropriate format of the security token, together with an **appropriate validation of some fields of it, must be used.*To protect 
privacy, the Token Binding identifiers are only transmitted encrypted 
and can be reset by the user at any time.

Also the introduction states:

(...)

    In order to successfully export and replay a bound security token,
the attacker needs to also be able to export the client's private
key, which is hard to do in the case of the key generated in a secure
hardware module.Proposed replacement

This should be replaced with:

(...)

*In order to successfully export and replay a bound security token,
**a client does not need to export the client's private**key, since
    it can perform all the necessary computations in the **case of a
    collaboration attack.

*

*2 -* In *draft-ietf-tokbind-https* add two additional paragraphs in the 
abstract
(and modify the content of the document in accordance):

Abstract This document describes a collection of mechanisms that allow 
HTTP servers to cryptographically bind authentication tokens (such 
ascookies and OAuth tokens) to TLS [RFC5246 
<https://tools.ietf.org/html/rfc5246>] connections. We describe both 
_first-party_ and _federated_ scenarios.In afirst-party scenario, an 
HTTP server is able to cryptographicallybind the security tokens it 
issues to a client, and which the client subsequently returns to the 
server, to the TLS connection between the client and server.Such bound 
security tokens are protected from misuse since the server can generally 
detect if they are replayedinappropriately, e.g., over other TLS 
connections.*However, the binding a security token to a TLS connection 
is **unable to counter collaboration attacks between two clients since 
**one client can compute the necessary information for the other 
**client without the need to release his key(s) to the other client. For 
an effective protection against collaboration attacks, an **appropriate 
format of the security token, together with an **appropriate validation 
of some fields of it, must be used.*Federated token bindings, on the 
other hand, allow servers tocryptographically bind security tokens to a 
TLS connection that theclient has with a _different_ server than the one 
issuing the token. This Internet-Draft is a companion document to The 
Token BindingProtocol [I-D.ietf-tokbind-protocol 
<https://tools.ietf.org/html/draft-ietf-tokbind-https-07#ref-I-D.ietf-tokbind-protocol>] 
In section 7.1, change the text in the following way:


      7.1. Security Token Export andReplayThe goal of the Federated
      Token Binding mechanisms is to preventattackers from exporting and
      replaying tokens used in protocols between the client and Token
      Consumer, thereby impersonatinglegitimate users and gaining access
      to protected resources.Boundtokens can still be replayed by
      malware present in the client.


      *They can also be exported and re-used when a client collaborates
      **with another client.In order to export the token to another
      **machine and successfully use it, a client may export the
      **corresponding private key to the other client or may perform all
      **the necessary computations for the other client without
      exporting **the corresponding private**.Protecting the Token
      Binding private **key, e.g. in a hardware security module that
      prevents key export is **a good practice, but in such a case, it
      is inefficient to counter **the clients collaboration attack.*


*3 - draft-ietf-oauth-token-binding-01* is based on the same foundations 
and hence is suject to the ABC attack.

The same kind of decision is facing the OAuth WG:

    *Option A*: drop draft-ietf-oauth-token-binding.

    or
    **

    *Option B*: clearly mention that the ABC attack cannot be countered
    using TLS binding.

In case, the latter decision would be taken by the OAuth WG, the 
abstract should be changed
(and the content of the document should be modified in accordance).

The current abstract states:

    This specification enables OAuth 2.0 implementations to apply Token
    Binding to Access Tokens and Refresh Tokens.  This cryptographically
    binds these tokens to the TLS connections over which they are
    intended to be used.  This use of Token Binding protects these tokens
    from man-in-the-middle and token export and replay attacks.

This should be changed into:

*    This specification enables OAuth 2.0 implementations to apply Token 
    Binding to Access Tokens and Refresh Tokens.  This cryptographically 
    binds these tokens to the TLS connections over which they are    
intended to be used.  This use of Token Binding protects these tokens    
from man-in-the-middle attacks, but does not protect in case two    
clients agree to collaborate, since one client can compute the necessary 
information for the other client without the need to release his key(s) 
to the other client.*

**

**
Denis

--------------9E3D0D6DEF50FB8617116055
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=utf-8" http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <br>
    <font face="Arial">There has been a WGLC in the Token Binding
      (tokbind) WG about the following documents:<br>
      <br>
      Â  draft-ietf-tokbind-protocol<br>
      Â  draft-ietf-tokbind-https<br>
      Â  draft-ietf-tokbind-negotiation<br>
      <br>
      I have posted the following comments:</font><br>
    <blockquote>
      <p><font face="Arial">This set of documents failed to meet the
          terms of references of the WG charter.<br>
          <br>
          It is not resistant to the ABC attack (Alice and Bob collusion
          attack).</font></p>
      <font face="Arial"> In this attack Bob who is older than 18
        colloborates with Alice and transmits a token to Alice </font><br>
      <font face="Arial"> who is only 14 so that she can demonstrate to
        a RS that she is older than 18.</font><br>
      <font face="Arial"> </font><br>
      <font face="Arial"> This kind of attack is not even mentionned in
        the security considerations section.</font><br>
    </blockquote>
    <p><font face="Arial"> <br>
========================================================================<br>
        <br>
        There are two options:<br>
        Â <br>
      </font><font face="Arial"> <b>Option A</b>: drop this series of
        documents, i.e. : </font><br>
      <font face="Arial"> </font><br>
      <font face="Arial"> Â  draft-ietf-tokbind-protocol</font><br>
      <font face="Arial"> Â  draft-ietf-tokbind-https</font><br>
      <font face="Arial"> Â  draft-ietf-tokbind-negotiation</font><br>
      <font face="Arial"> </font><br>
      <font face="Arial"> or </font><br>
      <font face="Arial"><b> </b></font></p>
    <p><font face="Arial"><b>Option B</b>: clearly mention that the ABC
        attack cannot be countered using TLS binding.</font><br>
      <font face="Arial"> <br>
        In case, the latter decision would be taken by the tokbind WG, I
        have proposed a few text replacements.</font></p>
    <p><b>1 - </b>In <font face="Arial"><b>draft-ietf-tokbind-protocol</b>,
        change the abstract in the following way </font><font
        face="Arial"><br>
        (and modify the content of the document in accordance): <br>
      </font></p>
    <pre wrap=""><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">   This document specifies Version 1.0 of the Token Binding protocol.
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>The Token Binding protocol allows client/server applications to<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>create long-lived, uniquely identifiable TLS [</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;"><a href="https://tools.ietf.org/html/rfc5246" title="&quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;"><span style="mso-ansi-language:EN-US" lang="EN-US">RFC5246</span></a></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">] bindings<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>spanning multiple TLS sessions and connections.<span style="mso-spacerun: yes">Â  </span>Applications are<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>then enabled to cryptographically bind security tokens to the TLS<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>layer. <b><span style="color:blue"><span style="mso-spacerun: yes">Â </span>However, the binding a security token to a TLS connection
 <o:p></o:p></span></b></span><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>is unable to counter collaboration attacks between two clients
 <o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>since one client can compute the necessary information for the
 </span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>other client without the need to release his key(s) to the other
 </span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>client.<span style="mso-spacerun: yes">Â  </span>For an effective protection against collaboration attacks,
 <o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>an appropriate format of the security token, together with an
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>appropriate validation of some fields of it, must be used.<span style="mso-spacerun: yes">Â  </span></span></b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">To
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>protect privacy, the Token Binding identifiers are only transmitted
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>encrypted and can be reset by the user at any time.<o:p></o:p></span></pre>
    <p><font face="Arial">Also the introduction states:</font></p>
    <p class="MsoNormal" style="margin-top:6.0pt">
      <span style="font-size:
        11.0pt;mso-bidi-font-size:12.0pt;font-family:&quot;Courier
        New&quot;;mso-ansi-language:
        EN-US" lang="EN-US"><o:p></o:p></span></p>
    <span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;">Â Â  <o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US">(...)
      <o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;"><o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun:
        yes">Â Â  </span><br>
      <br>
      Â Â  In order to successfully export and replay a bound security
      token,<br>
      <o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun:
        yes">Â Â  </span>the attacker needs to also be able to export the
      client's private<o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun:
        yes"><br>
        Â Â  </span>key, which is hard to do in the case of the key
      generated in a secure<o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun:
        yes"><br>
        Â Â  </span>hardware module.<o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US"> <o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US">Proposed replacement<o:p></o:p></span>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-size:
        11.0pt;mso-bidi-font-size:12.0pt;font-family:&quot;Courier
        New&quot;;mso-ansi-language:
        EN-US" lang="EN-US"><font face="Arial">This should be replaced
          with:</font><br>
      </span></p>
    <p class="MsoNormal" style="margin-top:6.0pt">
      <span style="font-size:
        11.0pt;mso-bidi-font-size:12.0pt;font-family:&quot;Courier
        New&quot;;mso-ansi-language:
        EN-US" lang="EN-US"><o:p></o:p></span></p>
    <span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;
      font-family:&quot;Courier New&quot;;mso-ansi-language:EN-US"
      lang="EN-US">Â <o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US">(...)<br>
      <br>
      <o:p></o:p></span><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
      New&quot;;
      mso-ansi-language:EN-US" lang="EN-US">Â <o:p></o:p></span><b><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
        New&quot;;
        color:blue;mso-ansi-language:EN-US" lang="EN-US"><span
          style="mso-spacerun: yes">Â  </span>In order to successfully
        export and replay a bound security token,<br>
        <o:p></o:p></span></b><b><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
        New&quot;;
        color:blue;mso-ansi-language:EN-US" lang="EN-US"><span
          style="mso-spacerun: yes">
          Â Â  </span>a client does not need to export the client's
        private<o:p></o:p></span></b><b><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
        New&quot;;
        color:blue;mso-ansi-language:EN-US" lang="EN-US"><span
          style="mso-spacerun: yes"> </span>key, since <br>
        Â Â  it can perform all the necessary computations in the </span></b><b><span
style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier
        New&quot;;
        color:blue;mso-ansi-language:EN-US" lang="EN-US"><span
          style="mso-spacerun: yes"></span>case of a <br>
        Â Â  collaboration attack.<br>
        <br>
      </span></b>
    <p><font face="Arial"> </font></p>
    <b>2 -</b> In <b><font face="Arial">draft-ietf-tokbind-https</font></b>
    add two additional paragraphs in the abstract <br>
    (and modify the content of the document in accordance):<br>
    <pre wrap=""><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;">
Abstract
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;">Â <o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>
   This document describes a collection of mechanisms that allow HTTP
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>servers to cryptographically bind authentication tokens (such as<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>cookies and OAuth tokens) to TLS [</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;"><a href="https://tools.ietf.org/html/rfc5246" title="&quot;The Transport Layer Security (TLS) Protocol Version 1.2&quot;"><span style="mso-ansi-language:EN-US" lang="EN-US">RFC5246</span></a></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">] connections.
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">
 <o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>We describe both _first-party_ and _federated_ scenarios.<span style="mso-spacerun: yes">Â  </span>In a<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>first-party scenario, an HTTP server is able to cryptographically<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>bind the security tokens it issues to a client, and which the client
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>subsequently returns to the server, to the TLS connection between the
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>client and server.<span style="mso-spacerun: yes">Â  </span>Such bound security tokens are protected from
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>misuse since the server can generally detect if they are replayed<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>inappropriately, e.g., over other TLS connections.<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"> 
<o:p></o:p></span><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>However, the binding a security token to a TLS connection is
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>unable to counter collaboration attacks between two clients since
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>one client can compute the necessary information for the other
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>client without the need to release his key(s) to the other client.

<span style="mso-spacerun: yes">Â Â  </span>For an effective protection against collaboration attacks, an
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>appropriate format of the security token, together with an
<font face="Arial">  </font></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>appropriate validation of some fields of it, must be used.<o:p></o:p></span></b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"> 

<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>Federated token bindings, on the other hand, allow servers to<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>cryptographically bind security tokens to a TLS connection that the<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>client has with a _different_ server than the one issuing the token.
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>This Internet-Draft is a companion document to The Token Binding<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes"> 
<font face="Arial"> </font> Â </span>Protocol [</span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;"><a href="https://tools.ietf.org/html/draft-ietf-tokbind-https-07#ref-I-D.ietf-tokbind-protocol"><span style="mso-ansi-language:EN-US" lang="EN-US">I-D.ietf-tokbind-protocol</span></a></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">]

<font face="Arial">In </font></span></span></font><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">section 7.1, change the text in the following way:
<font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><h3 style="tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:11.0pt;mso-bidi-font-size:13.5pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">7.1. Security Token <span style="color:blue">Export and</span></span><span style="font-size:11.0pt;mso-bidi-font-size:13.5pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><font face="Arial"> </font>Replay</span><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US">

<span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;
font-family:&quot;Courier New&quot;;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>The goal of the Federated Token Binding mechanisms is to prevent<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>attackers from exporting and replaying tokens used in protocols
<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â  </span>between the client and Token Consumer, thereby impersonating<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>legitimate users and gaining access to protected resources.<span style="mso-spacerun: yes">Â  </span>Bound<o:p></o:p></span><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>tokens can still be replayed by malware present in the client.<span style="mso-spacerun: yes"></span></span></span></font></h3></span></font></span></font><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><h3 style="tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:11.0pt;mso-bidi-font-size:13.5pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US"><o:p></o:p></span></h3></span></font><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><h3 style="tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt"><font face="Arial" size="-1"><span style="font-size: 11pt;" lang="EN-US"><font face="Courier New"><span style="font-size: 11pt;" lang="EN-US"><span style="mso-spacerun: yes">  </span></span><b><span style="font-size: 11pt; color: blue;" lang="EN-US"><span style="mso-spacerun: yes"> </span>They can also be exported and re-used when a client collaborates
 </span></b></font><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><font face="Courier New"><span style="mso-spacerun: yes">Â  </span>wit</font>h another client.<span style="mso-spacerun: yes">Â  </span>In order to export the token to another
 </span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â  </span>machine and successfully use it, a client may export the <o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>corresponding private key to the other client or may perform all 
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>the necessary computations for the other client without exporting 
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>the corresponding private</span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">.<span style="color:blue"><span style="mso-spacerun: yes">Â  </span>Protecting the Token Binding private <o:p></o:p></span></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>key, e.g. in a hardware security module that prevents key export is <o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">
Â Â  </span>a good practice, but in such a case, it is inefficient to counter 
<o:p></o:p></span></b><b><span style="font-size:11.0pt;mso-bidi-font-size:10.0pt;font-family:&quot;Courier New&quot;;
color:blue;mso-ansi-language:EN-US" lang="EN-US"><span style="mso-spacerun: yes">Â Â Â </span>the clients collaboration attack.<o:p></o:p></span></b> </span></font></h3></span></font></span></font></span></span></font></pre>
    <br>
    <b>3 - draft-ietf-oauth-token-binding-01</b> is based on the same
    foundations and hence is suject to the ABC attack.<br>
    <br>
    The same kind of decision is facing the OAuth WG:<br>
    <blockquote><font face="Arial"><b>Option A</b>: drop </font><font
        face="Arial">draft-ietf-oauth-token-binding.</font><br>
      <font face="Arial"> Â  </font><br>
      <font face="Arial"> or </font><br>
      <font face="Arial"><b> </b></font>
      <p><font face="Arial"><b>Option B</b>: clearly mention that the
          ABC attack cannot be countered using TLS binding.<br>
        </font></p>
    </blockquote>
    <font face="Arial">In case, the latter decision would be taken by
      the OAuth WG, the abstract should be changed </font><br>
    (and the content of the document should be modified in accordance).<br>
    <br>
    The current abstract states:<br>
    <br>
    Â Â  This specification enables OAuth 2.0 implementations to apply
    Token<br>
    Â Â  Binding to Access Tokens and Refresh Tokens.Â  This
    cryptographically<br>
    Â Â  binds these tokens to the TLS connections over which they are<br>
    Â Â  intended to be used.Â  This use of Token Binding protects these
    tokens<br>
    Â Â  from man-in-the-middle and token export and replay attacks.<br>
    <br>
    This should be changed into:<br>
    <br>
    <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
    <pre><b><span style="font-family:&quot;Courier New&quot;;
mso-ansi-language:EN-US" lang="EN-US">Â Â  This specification enables OAuth 2.0 implementations to apply Token
Â Â  Binding to Access Tokens and Refresh Tokens.Â  This cryptographically
Â Â  binds these tokens to the TLS connections over which they are
Â Â  intended to be used.Â  This use of Token Binding protects these tokens
Â Â  from man-in-the-middle attacks, <font color="#000099">but does not protect in case two 
Â Â  clients agree to collaborate, </font><span style="color:blue"><font color="#000099">since one client can compute the 
<span style="mso-spacerun: yes">Â Â  </span>necessary information for the other client without the need to 
<span style="mso-spacerun: yes">Â Â  </span>release his key(s) to the other client.</font><o:p></o:p></span></span></b></pre>
    <pre><b><span style="font-family:&quot;Courier New&quot;;color:blue;mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]-->Â <!--[endif]--><o:p></o:p></span></b></pre>
    <b><span
style="font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:&quot;Courier
        New&quot;;
        mso-fareast-font-family:&quot;Times New
        Roman&quot;;color:blue;mso-ansi-language:EN-US;
        mso-fareast-language:FR;mso-bidi-language:AR-SA" lang="EN-US"></span></b>
    <meta name="ProgId" content="Word.Document">
    <meta name="Generator" content="Microsoft Word 9">
    <meta name="Originator" content="Microsoft Word 9">
    <link rel="File-List"
href="file:///C:/Users/Denis/AppData/Local/Temp/msoclip1/02/clip_filelist.xml">
    <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:HyphenationZone>21</w:HyphenationZone>
  <w:DoNotOptimizeForBrowser/>
 </w:WordDocument>
</xml><![endif]-->
    <style>
<!--
 /* Font Definitions */
@font-face
	{font-family:"Arial Unicode MS";
	panose-1:2 11 6 4 2 2 2 2 2 4;
	mso-font-charset:128;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-1 -369098753 63 0 4129279 0;}
@font-face
	{font-family:"\@Arial Unicode MS";
	panose-1:2 11 6 4 2 2 2 2 2 4;
	mso-font-charset:128;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:-1 -369098753 63 0 4129279 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
pre
	{margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:10.0pt;
	font-family:"Arial Unicode MS";}
@page Section1
	{size:612.0pt 792.0pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;
	mso-header-margin:36.0pt;
	mso-footer-margin:36.0pt;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
-->
</style><br>
    Denis<br>
  </body>
</html>

--------------9E3D0D6DEF50FB8617116055--


From nobody Wed Dec 21 11:17:48 2016
Return-Path: <denis.ietf@free.fr>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DD4B1295A0 for <oauth@ietfa.amsl.com>; Wed, 21 Dec 2016 11:17:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.618
X-Spam-Level: 
X-Spam-Status: No, score=-2.618 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MEcWgCxphnbA for <oauth@ietfa.amsl.com>; Wed, 21 Dec 2016 11:17:41 -0800 (PST)
Received: from smtp6-g21.free.fr (smtp6-g21.free.fr [212.27.42.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C073127735 for <oauth@ietf.org>; Wed, 21 Dec 2016 11:17:41 -0800 (PST)
Received: from [192.168.0.13] (unknown [88.182.125.39]) by smtp6-g21.free.fr (Postfix) with ESMTP id A29227803A2 for <oauth@ietf.org>; Wed, 21 Dec 2016 20:17:38 +0100 (CET)
To: oauth@ietf.org
References: <f5f049b9-1aca-9949-ffd6-c9ce1396ef31@free.fr> <97ba9e08-6179-3157-1017-c616c42ba64f@free.fr>
From: Denis <denis.ietf@free.fr>
Message-ID: <2e7651a5-1586-d72d-c913-57ca48061303@free.fr>
Date: Wed, 21 Dec 2016 20:17:43 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1
MIME-Version: 1.0
In-Reply-To: <97ba9e08-6179-3157-1017-c616c42ba64f@free.fr>
Content-Type: multipart/alternative; boundary="------------E7D165A549FE061BF92D6DA7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/ntGDsrzlue_EHaKvJjxGbnzpj48>
Subject: [OAUTH-WG] Comments on draft-ietf-oauth-pop-architecture-08
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Dec 2016 19:17:45 -0000

This is a multi-part message in MIME format.
--------------E7D165A549FE061BF92D6DA7
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit

Comments on draft-ietf-oauth-pop-architecture-08 : OAuth 2.0 
Proof-of-Possession (PoP) Security Architecture

This document identifies the four following threats in Section 4:

  * Token manufacture/modification,
  * Token disclosure,
  * Token redirect, and
  * Token reuse.

However, this section is omitting to consider the ABC attack (Alice and 
Bob collusion attack).
In this attack Bob who is older than 18 collaborates with Alice and 
transmits an access token to Alice
who is only 14 so that she can demonstrate to a resource server that she 
is older than 18.

Since the remaining of the document is only considering the threats 
mentioned in Section 4, it does not mandate
any requirement to counter the ABC attack nor suggests a means to 
counter it.

In section 5, various requirements are considered. On page 9, under the 
wording "Collusion",
there are the following explanations

*Resource servers that collude can be prevented from using
information related to the resource owner to track the individual.

*

*That is, two different resource servers can be prevented from
determining that the same resource owner has authenticated to both
of them.Authorization servers MUST bind different keying
material to access tokens used for resource servers from different
origins (or similar concepts in the app world).*

Two cases should be considered instead: (a) *Server Collusions*, where 
the current text may fit, and (b) *Client Collusions*.

Client Collusions might be defined in the following way:**

*Clients Collusion*

**

*Clients may collude, i.e. a client can obtain a token and pass it
to another client that can then use it for its own benefits. As
an example, in a scenario described as ABC attack (Alice and Bob
collusion attack), Bob who is older than 18 collaborates with
Alice and transmits an access token to Alice who is only 14 so
       that she can demonstrate to a server that she is older than 18.
The protection of binding keys in an hardware security module is
       a first step to counter such a scenario, but is insufficient by
itself since the Bob can still perform all the computations that
Alice needs and transmit the results to her.*

**

*Clients collusion can however be prevented if such an hardware
security module (or secure element) protects the keys but also
supports additional security properties.*

**

In section 5, Channel Binding is being considered with the following 
explanations:

*A solution MUST enable support for channel bindings.The concept*

*of channel binding, as defined in [RFC5056], allows applications*

*to establish that the two end-points of a secure channel at one*

*network layer are the same as at a higher layer by binding*

*authentication at the higher layer to the channel at the lower*

*layer.*

As explained in other emails, channel binding is efficient to counter 
man-in-the-middle attacks but is inefficient to counter
the ABC attack. Hence the use of the word "MUST" is not appropriate. The 
first sentence should be removed.
The paragraph should be changed into :

*Channel Binding*

*The concept of channel binding, as defined in [RFC5056], allows
applications to establish that the two end-points of a secure
channel at one network layer are the same as at a higher layer
by binding authentication at the higher layer to the channel at
the lower layer.  While efficient to counter man-in-the-middle
attacks, channel binding is unable to counter clients collusions.*

**

At the end of section 6.3. (Key Confirmation), a paragraph should be added.

**

*Whatever kind of cryptography is being used, such methods when
       used in isolation are unable to counter collusions between clients.*

**

The last sentence of section 6.4 states:

**

*In all cases above it has to be ensured that the client is able to*

*keep the credentials secret.*

**

After that sentence, the following sentence should be added:

**

*However, when two clients agree to collaborate, these approaches,
     used alone, are unable to counter clients collusions.*

**

Section 8 states:

**

*8.Security Considerations*

**

*The purpose of this document is to provide use cases, requirements,*

*and motivation for developing an OAuth security solution extending*

*Bearer Tokens.As such, this document is only about security.*

**

This should be replaced by:

**

*8.Security Considerations*

**

*This document considers various threats. In the case where two users
    agree to collaborate, a client can obtain an access token and pass it
    to another client which can then use it for its own benefits. This
    document does not specify in details the means to counter such a 
threat.

*

*   The use of secure elements or of ***hardware security modules* 
protecting
    the private keys or/and the secret keys used by a given client would
    be ***one way to counter *that threat but additional security 
properties
    would also need to be supported by such **secure elements or 
***hardware
    security modules*****.
*

*
*


**

There are two options for this WG:

*Option A*: incorporate the proposed additions and hence implicitly 
recognize that the ABC attack is not countered
by this architecture.

or
**

*Option B*: attempt to propose solutions to counter the ABC attack and 
hence continue to work on this document
This implies working on a rather different PoP Architecture.

There exists different solutions.

1) One of them mandates the deployment of secure elements, but the 
architecture is very complex and requires
up to 45 exchanges most of them using secure messaging (See EN 419212-2 
: Application Interface for smart cards
used as Secure Signature Creation Devices). Privacy has not been 
considered when the architecture has been built
and hence this solution is not privacy friendly. In particular, Resource 
Servers are able to correlate their user accounts.
Resource Servers are also required to use hardware security modules.


2) Another one does not mandate the use of a secure element (or of an 
hardware security module). Resource Servers are
unable to correlate their user accounts which is a nice privacy 
property, ... but most of the time receive a set of attributes
that is sufficient to fully identify the user ! (this could be changed, 
but it is how the current architecture has been deployed).
The currently deployed solution mandates the use of a single 
Authorization Server that knows where each access token
it generates will be used. In addition, the Authorization Server knows 
all the identity attributes of each user and is able to track
the accesses of each user. Hence, this single Authorization Server 
(managed by a government) would have (or has ?) the
perfect position to act as Big Brother.


3) Another one has been built from the very beginning with privacy in 
mind and hence has been using a "Privacy by Design"
approach and, during its construction, the ABC attack has been 
specifically considered. It mandates the use of secure elements
(or of hardware security modules) with specific properties and mandates 
the use of protocols with specific characteristics
both between clients and Authorization Servers and between clients and 
Resource Servers. Authorization Servers and Resource
Servers are NOT required to use any hardware security module.

One of the side benefits of this solution is that Authorization Servers 
are unable to know where the access tokens they generate
for a given client will be used. Hence their ability to act as Big 
Brother is limited.


4) Other solutions may exist.
**



Since the ABC attack is about to cheat that a person is older than 18, 
privacy considerations are of utmost importance.
The current document has a "Security Considerations" section but is 
lacking a "Privacy Considerations" section.
Both are of equal importance.


Denis

**


--------------E7D165A549FE061BF92D6DA7
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <meta http-equiv="Content-Type" content="text/html;
      charset=windows-1252">
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">Comments on
        draft-ietf-oauth-pop-architecture-08 : OAuth 2.0
        Proof-of-Possession (PoP) Security
        Architecture <br>
      </span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">This document
        identifies the four following
        threats in Section 4: <br>
      </span></p>
    <ul>
      <li><span style="font-family:
          Arial;mso-ansi-language:EN-US" lang="EN-US">Token
          manufacture/modification, </span></li>
      <li><span style="font-family:
          Arial;mso-ansi-language:EN-US" lang="EN-US">Token disclosure,
        </span></li>
      <li><span style="font-family:
          Arial;mso-ansi-language:EN-US" lang="EN-US">Token
          redirect, and </span></li>
      <li><span style="font-family:
          Arial;mso-ansi-language:EN-US" lang="EN-US">Token reuse.<o:p></o:p></span></li>
    </ul>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">However, this
        section is omitting to consider
        the ABC attack (Alice and Bob collusion attack). <br>
        In this attack Bob who is older than 18 collaborates with Alice
        and transmits an access token to Alice <br>
        who is only 14 so that she can demonstrate to a resource server
        that she is
        older than 18.<o:p></o:p></span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">Since the remaining
        of the document is only
        considering the threats mentioned in Section 4, it does not
        mandate <br>
        any
        requirement to counter the ABC attack nor </span><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US"><span
          style="font-family:
          Arial;mso-ansi-language:EN-US" lang="EN-US">suggests </span>a
        means to counter it.
        <!--[endif]--><o:p></o:p></span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">In section 5,
        various requirements are considered. On
        page 9, under the wording "Collusion", <br>
        there are the following
        explanations <o:p></o:p></span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>Resource
          servers that collude can be prevented from using<br>
          <span style="mso-spacerun: yes">      </span>information
          related to the
          resource owner to track the individual.<br
            style="mso-special-character:line-break">
          <!--[if !supportLineBreakNewLine]--><br
            style="mso-special-character:line-break">
          <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>That is,
          two different resource servers can be prevented from<br>
          <span style="mso-spacerun: yes">      </span>determining that
          the same resource
          owner has authenticated to both<br>
          <span style="mso-spacerun: yes">      </span>of them.<span
            style="mso-spacerun:
            yes">  </span>Authorization servers MUST bind different
          keying<br>
          <span style="mso-spacerun: yes">      </span>material to
          access tokens used for
          resource servers from different<br>
          <span style="mso-spacerun: yes">      </span>origins (or
          similar concepts in
          the app world).<o:p></o:p></span></b></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">Two cases should be
        considered instead: (a) <b>Server
          Collusions</b>, where the current text may fit, and (b) <b>Client
          Collusions</b>. <br>
      </span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">Client Collusions
        might be defined in the
        following way:</span><b><span style="font-family:&quot;Courier
          New&quot;;mso-ansi-language:EN-US" lang="EN-US">
          <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><font color="#3333ff"><b><span
            style="font-family:&quot;Courier
            New&quot;;mso-ansi-language:EN-US" lang="EN-US">Clients
            Collusion<o:p></o:p></span></b></font></p>
    <font color="#3333ff">
    </font>
    <p class="MsoNormal" style="margin-top:6.0pt"><font color="#3333ff"><b><span
            style="font-family:&quot;Courier
            New&quot;;mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></font></p>
    <font color="#3333ff">
    </font>
    <p class="MsoNormal"><font color="#3333ff"><b><span
            style="font-family:&quot;Courier New&quot;;
            mso-ansi-language:EN-US" lang="EN-US"><span
              style="mso-spacerun: yes">      </span>Clients
            may collude, i.e. a client can obtain a token and pass it <br>
            <span style="mso-spacerun: yes">      </span>to another
            client that can then
            use it for its own benefits. As <br>
            <span style="mso-spacerun: yes">      </span>an example, in
            a scenario
            described as ABC attack (Alice and Bob <br>
            <span style="mso-spacerun: yes">      </span>collusion
            attack), Bob who is
            older than 18 collaborates with <br>
            <span style="mso-spacerun: yes">      </span>Alice and
            transmits an access token to
            Alice who is only 14 so <br>
                  that she <span style="mso-spacerun: yes"></span>can
            demonstrate to a server that
            she is older than 18.<span style="mso-spacerun: yes">  <br>
                    </span>The <span style="mso-spacerun: yes"></span>protection
            of binding keys in an
            hardware security module is <br>
                  a <span style="mso-spacerun: yes"></span>first step
            to counter such a
            scenario, but is insufficient by <br>
            <span style="mso-spacerun: yes">      </span>itself since
            the Bob can still
            perform all the computations that <br>
            <span style="mso-spacerun: yes">      </span>Alice needs
            and transmit the
            results to her.<o:p></o:p></span></b></font></p>
    <font color="#3333ff">
    </font>
    <p class="MsoNormal"><font color="#3333ff"><b><span
            style="font-family:&quot;Courier New&quot;;
            mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></font></p>
    <font color="#3333ff">
    </font>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><font color="#3333ff"><span
              style="mso-spacerun: yes">      </span>Clients
            collusion can however be prevented if such an hardware <br>
            <span style="mso-spacerun: yes">      </span>security
            module (or secure
            element) protects the keys but also <br>
            <span style="mso-spacerun: yes">      </span>supports
            additional security properties.</font><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">In section 5,
        Channel Binding is being
        considered with the following explanations:<o:p></o:p></span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>A
          solution MUST enable support for channel bindings.<span
            style="mso-spacerun:
            yes">  </span>The concept<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>of
          channel binding, as defined in [RFC5056], allows applications<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>to
          establish that the two end-points of a secure channel at one<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>network
          layer are the same as at a higher layer by binding<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">     
          </span>authentication at the higher layer to the channel at
          the lower<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span>layer.<o:p></o:p></span></b></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US">As explained in
        other emails, channel binding is
        efficient to counter man-in-the-middle attacks but is
        inefficient to counter <br>
        the ABC
        attack. Hence the use of the word "MUST" is not appropriate. The
        first sentence
        should be removed. <br>
        The paragraph should be changed into :<o:p></o:p></span></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><b><span
          style="font-family:&quot;Courier
          New&quot;;mso-ansi-language:EN-US" lang="EN-US">Channel
          Binding<o:p></o:p></span></b></p>
    <p class="MsoNormal" style="margin-top:6.0pt"><span
        style="font-family:
        Arial;mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">      </span><font
            color="#3333ff">The
            concept of channel binding, as defined in [RFC5056], allows
            <br>
            <span style="mso-spacerun: yes">      </span>applications
            to establish that the
            two end-points of a secure <br>
            <span style="mso-spacerun: yes">      </span>channel at one
            network layer are
            the same as at a higher layer <br>
            <span style="mso-spacerun: yes">      </span>by binding
            authentication at the
            higher layer to the channel at <br>
            <span style="mso-spacerun: yes">      </span>the lower
            layer.  While efficient
            to counter man-in-the-middle <br>
            <span style="mso-spacerun: yes">      </span>attacks,
            channel binding is unable to counter clients <span
              style="mso-spacerun: yes"></span>collusions.</font><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">At the end of section 6.3. (Key
        Confirmation), a paragraph should be
        added.<o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><font color="#3333ff"><span
              style="mso-spacerun: yes">      </span>Whatever
            kind of cryptography is being used, such methods when <br>
                  used in isolation are unable to counter
            collusions between clients.</font><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">The last sentence of section 6.4 states:<o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">   </span>In all cases
          above it has to be ensured that the client is able to<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">   </span>keep the
          credentials secret.<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">After that sentence, the following sentence
        should
        be added:<o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><font color="#3333ff"><span
              style="mso-spacerun: yes">    </span>However, when two
            clients agree to collaborate, these approaches, <br>
                used
            alone, are unable to counter clients collusions.</font><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">Section 8 states:<o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US">8.<span
            style="mso-spacerun: yes">  </span>Security
          Considerations<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">   </span>The purpose
          of this document is to provide use cases, requirements,<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">   </span>and motivation
          for developing an OAuth security solution extending<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">   </span>Bearer
          Tokens.<span style="mso-spacerun: yes">  </span>As such, this
          document is only
          about security.<o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">This should be replaced by:<o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><font
            color="#3333ff"><o:p></o:p></font></span></b></p>
    <font color="#3333ff">
    </font>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><font color="#3333ff">8.<span
              style="mso-spacerun: yes">  </span>Security
            Considerations</font><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><span
            style="mso-spacerun: yes">   </span><font color="#3333ff">This
            document considers various threats. In the case where two
            users <br>
               agree to collaborate, a client can obtain an access
            token and pass it <br>
               to another <span style="mso-spacerun: yes"></span>client
            which can then use it for its
            own benefits. This <br>
               document does not specify in details the means to counter
            such a threat. <br>
               <br>
          </font></span></b></p>
    <p class="MsoNormal"><font color="#3333ff"><b><span
            style="font-family:&quot;Courier New&quot;;
            mso-ansi-language:EN-US" lang="EN-US">   The use of secure
            elements or of </span></b><b><span
            style="font-family:&quot;Courier New&quot;;
            mso-ansi-language:EN-US" lang="EN-US"><b><span
                style="font-family:&quot;Courier New&quot;;
                mso-ansi-language:EN-US" lang="EN-US">hardware <span
                  style="mso-spacerun: yes"></span>security modules</span></b>
            protecting <br>
               the private keys or/and the secret keys used by a given
            client would <br>
               be </span></b><b><span style="font-family:&quot;Courier
            New&quot;;
            mso-ansi-language:EN-US" lang="EN-US"><b><span
                style="font-family:&quot;Courier New&quot;;
                mso-ansi-language:EN-US" lang="EN-US"><span
                  style="mso-spacerun: yes"></span>one way to counter </span></b>that
            threat but additional security properties <br>
               would also need to be supported by such </span></b><b><span
            style="font-family:&quot;Courier New&quot;;
            mso-ansi-language:EN-US" lang="EN-US">secure
            elements or </span></b><b><span
            style="font-family:&quot;Courier New&quot;;
            mso-ansi-language:EN-US" lang="EN-US"><b><span
                style="font-family:&quot;Courier New&quot;;
                mso-ansi-language:EN-US" lang="EN-US">hardware <span
                  style="mso-spacerun: yes"></span><br>
                   security modules</span></b></span></b></font><b><span
          style="font-family:&quot;Courier New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><font color="#3333ff"><b><span
                style="font-family:&quot;Courier New&quot;;
                mso-ansi-language:EN-US" lang="EN-US"></span></b>. </font><br>
        </span></b></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><br>
        </span></b></p>
    <p class="MsoNormal"><br>
      <b><span style="font-family:&quot;Courier New&quot;;
          mso-ansi-language:EN-US" lang="EN-US">
          <!--[if !supportLineBreakNewLine]--></span></b></p>
    <p class="MsoNormal"><font face="Arial">There are two options for
        this WG:<br>
         <br>
      </font><font face="Arial"> <b>Option A</b>: incorporate the
        proposed additions and hence implicitly recognize that the ABC
        attack is not countered <br>
        by this architecture. </font><br>
      <font face="Arial"> </font><br>
      <font face="Arial"> or </font><br>
      <font face="Arial"><b> </b></font> </p>
    <p><font face="Arial"><b>Option B</b>: attempt to propose solutions
        to counter t</font><font face="Arial"><font face="Arial">he ABC
          attack and hence c</font>ontinue to work on this document <br>
        This implies working on a rather different PoP Architecture. <br>
      </font></p>
    <p><font face="Arial">There exists different solutions.</font></p>
    <p><font face="Arial">1) One of them mandates the deployment of
        secure elements, but the architecture is very complex and
        requires <br>
        up to 45 exchanges most of them using secure messaging (See EN
        419212-2 : Application Interface for smart cards <br>
        used as Secure Signature Creation Devices). Privacy has not been
        considered when the architecture has been built <br>
        and hence this solution is not privacy friendly. In particular,
        Resource Servers are able to correlate their user accounts.</font><br>
      <font face="Arial"><font face="Arial">Resource Servers are also
          required to use </font></font><font face="Arial"><font
          face="Arial"><font face="Arial">hardware security modules.</font></font></font></p>
    <font face="Arial"><br>
      2) Another one does not mandate the use of a secure element (or of
      an hardware security module). Resource Servers are <br>
      unable to correlate their user accounts which is a nice privacy
      property, ... but most of the time receive a set of attributes <br>
      that is sufficient to fully identify the user ! (this could be
      changed, but it is how the current architecture has been
      deployed). <br>
      The </font><font face="Arial"><font face="Arial">currently </font>deployed
      solution mandates the use of a single Authorization Server that </font><font
      face="Arial">knows where each access token <br>
      it generates will be used. In addition, the </font><font
      face="Arial"><font face="Arial">Authorization Server knows all the
        identity attributes of each user and is able to track <br>
        the accesses of each user. H</font></font><font face="Arial"><font
        face="Arial"><font face="Arial">ence, this </font></font></font><font
      face="Arial"><font face="Arial"><font face="Arial"><font
            face="Arial">single Authorization Server</font> (managed by
          a government) would have (or has ?) the <br>
          perfect position to act as Big Brother.<br>
          <br>
          <br>
        </font></font>3) Another one has been built from the very
      beginning with privacy in mind and hence has been using a "Privacy
      by Design" <br>
      approach and, during its construction, the ABC attack has been
      specifically considered. It mandates the use of secure elements <br>
      (or of hardware security modules) with specific properties and
      mandates the use of protocols with specific characteristics <br>
      both between clients and Authorization Servers and between clients
      and Resource Servers. </font><font face="Arial"><font
        face="Arial">Authorization Servers and Resource <br>
        Servers are NOT required to use any </font></font><font
      face="Arial"><font face="Arial"><font face="Arial">hardware
          security module.<br>
          <br>
        </font></font>One of the side benefits of this solution is that
      Authorization Servers are unable to know where the access tokens
      they generate <br>
      for </font><font face="Arial"><font face="Arial">a given client </font>will
      be used. Hence their ability to act as Big Brother is limited.<br>
      <br>
    </font><font face="Arial"><br>
      4) Other solutions may exist.</font><br>
    <b><span style="font-family:&quot;Courier New&quot;;
        mso-ansi-language:EN-US" lang="EN-US">
        <!--[endif]--></span></b><span
      style="font-family:Arial;mso-ansi-language:
      EN-US" lang="EN-US"><o:p></o:p></span>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US"><br>
      </span></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US"><br>
      </span></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">Since the ABC attack is about to cheat that
        a person is older than 18, privacy considerations are of utmost
        importance.<br>
        The current document has a "Security Considerations" section but
        is lacking a "Privacy Considerations" section. <br>
        Both are of equal importance.</span></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US"><br>
      </span></p>
    <p class="MsoNormal"><span
        style="font-family:Arial;mso-ansi-language:
        EN-US" lang="EN-US">Denis<o:p></o:p></span></p>
    <p class="MsoNormal"><b><span style="font-family:&quot;Courier
          New&quot;;
          mso-ansi-language:EN-US" lang="EN-US"><!--[if !supportEmptyParas]--> <!--[endif]--><o:p></o:p></span></b></p>
    <meta name="ProgId" content="Word.Document">
    <meta name="Generator" content="Microsoft Word 9">
    <meta name="Originator" content="Microsoft Word 9">
    <link rel="File-List"
href="file:///C:/Users/Denis/AppData/Local/Temp/msoclip1/02/clip_filelist.xml">
    <!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:View>Normal</w:View>
  <w:Zoom>0</w:Zoom>
  <w:HyphenationZone>21</w:HyphenationZone>
  <w:DoNotOptimizeForBrowser/>
 </w:WordDocument>
</xml><![endif]-->
    <style>
<!--
 /* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;
	mso-font-charset:2;
	mso-generic-font-family:auto;
	mso-font-pitch:variable;
	mso-font-signature:0 268435456 0 0 -2147483648 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0cm;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
@page Section1
	{size:595.3pt 841.9pt;
	margin:70.85pt 70.85pt 70.85pt 70.85pt;
	mso-header-margin:35.4pt;
	mso-footer-margin:35.4pt;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
 /* List Definitions */
@list l0
	{mso-list-id:631861497;
	mso-list-type:hybrid;
	mso-list-template-ids:-1808529858 846768278 67895299 67895301 67895297 67895299 67895301 67895297 67895299 67895301;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:36.0pt;
	mso-level-number-position:left;
	text-indent:-18.0pt;
	mso-hansi-font-family:Arial;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
-->
</style>
  </body>
</html>

--------------E7D165A549FE061BF92D6DA7--


From riyadh.biyram@gmail.com  Thu Dec 22 03:49:38 2016
Return-Path: <riyadh.biyram@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0877A129859 for <oauth@ietfa.amsl.com>; Thu, 22 Dec 2016 03:49:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level: 
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BBiV-bUuG8PH for <oauth@ietfa.amsl.com>; Thu, 22 Dec 2016 03:49:37 -0800 (PST)
Received: from mail-qt0-x22e.google.com (mail-qt0-x22e.google.com [IPv6:2607:f8b0:400d:c0d::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFD0B129856 for <oauth@ietf.org>; Thu, 22 Dec 2016 03:49:36 -0800 (PST)
Received: by mail-qt0-x22e.google.com with SMTP id c47so232230902qtc.2 for <oauth@ietf.org>; Thu, 22 Dec 2016 03:49:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=dOmEfp+gi4eAjYgWXXg+XyzKs/fVOLn7l7+I0eJv/+c=; b=cnHLVuPsTEzDBx8/MBpSWu2bhZ+EopPYrA8kQ/+dCr9qC0Wj9BQ9nftKWdHRE08DVl 4ilsSXKpVdxn1ITEQdSIZv8Efz6l/6/Y9BMl42XvcfgcASZCbOxytE2+NezwIycJy/KL 8n+K9LXbXqH5RyzPl26F4sKa69ZMSvmxR0Jzj7xTu9289KF+2jvYIauzfrnSzkXXl2da zkP6/ZdrzECVVqwL1CXIZ1BZSL+coIB1Y/5jFneofHDBZCty4ovi/lyLQbzJtHcMitkk EhMESilojk/cbMurqru49tzO+R5pHEmLwFYf4mU43qf58R/wnkT/43TnyckPpc/ebRqz SrtQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=dOmEfp+gi4eAjYgWXXg+XyzKs/fVOLn7l7+I0eJv/+c=; b=XpH/8H7WoqXyzjAD7tBbVI5/u1qW3sg46QGVZPqzK+wtejaRuPl+XasJWwgON4GbHj j3YThKt1JYnYnpZkTas15uAvyrVaZOxZEvc1wY4k19k/oOpsnwsPYNYsObbmblOJUjbt wNVwToV/d/SIV9kWOf9s7J4D22kX7eO/kKARs5LV6vfaD1eGWRZlO8Fk/mYotwR+nHkm K0VeqlysRVA4Bb1LwcA1MVwpVOqdW9PsMASPc7GBDyA/FRv8/y2CrLo34HnmSqcItkVn TM+JotbdywJHTiI7eXaX7a1LlCx2nophdLYMIPBWXHsW/JvROP7Oyl7IUYDL4u2nWlHA ibmQ==
X-Gm-Message-State: AIkVDXKJaIF7ZujBFwp+XKq80jTgnh+SVQ82vK3JLxpV3yFvWi91vmOlsVgUt3bJvLf4km5QGjR+GbvIP65Hew==
X-Received: by 10.200.38.177 with SMTP id 46mr9079498qto.107.1482407375913; Thu, 22 Dec 2016 03:49:35 -0800 (PST)
MIME-Version: 1.0
Received: by 10.233.235.130 with HTTP; Thu, 22 Dec 2016 03:49:35 -0800 (PST)
From: Riyadh Biyram <riyadh.biyram@gmail.com>
Date: Thu, 22 Dec 2016 12:49:35 +0100
Message-ID: <CAGDd68OKHdMxKJFcR4T+grrL48-2Z1HqH3BNSNSesxHqGgWL5Q@mail.gmail.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=001a1149b9a80dc79605443dddf1
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/DpO9YyKo66KIYpnvrxHA8mdRd70>
X-Mailman-Approved-At: Tue, 27 Dec 2016 06:44:04 -0800
Subject: [OAUTH-WG] Downloading and uploading files by using OAuth in C# language on the Dropbox Platform without creating a new app on the Dropbox Platform to get applicationkey and secretkey?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Dec 2016 22:38:03 -0000

--001a1149b9a80dc79605443dddf1
Content-Type: text/plain; charset=UTF-8

Hello,


I use currently the OAuth technique and I have a question and I hope,
you can help me?


I would like to know how can I use OAuth 2.0 (within C# WPF
application or any langauge to achieve the request) to download and
upload files from Dropbox. It appears that the OAuth 2.0 works by
forwarding you to a Dropbox Platform and getting you confirm details
for example that is means registering the application with external
providers(Dropbox Platform API) to get the application key and secret
key.

(creating a new application on the Dropbox platform

to get applicationkey and secret key

 https://www.dropbox.com/developers/apps/create).


How can I use it without application key and secret key direct to
connect and maybe get the application key with secret key in
background without showing anything to the user of the application for
example like "Screenpresso" software with this software you don't need
to get applciation key or secret key only you sign in by the email and
password to grant access the features.


If there are other extra techniques, please write them to my email.

Thanks in advance.

Best regards,

Riyadh Biyram


*Riyadh Biyram*
Software Engineer & Software Developer
m:  + <555-77777>49 (0) 1577 858 6688   |    e:rb50575@gmail.com
<riyadh.biyram@gmail.com> Skype :riyadh.biyram

--001a1149b9a80dc79605443dddf1
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div></div><div></div><div><table class=3D"gmail-m_1408546=
303365905243m_-9158980618927288472form-items" cellpadding=3D"0" cellspacing=
=3D"0" style=3D"font-family:&quot;helvetica neue&quot;,helvetica,arial,sans=
-serif;font-size:14px;box-sizing:border-box;width:574.545px;margin:0px"><tb=
ody><tr style=3D"box-sizing:border-box;font-size:14px;margin:0px"><td valig=
n=3D"top" style=3D"font-family:&quot;helvetica neue&quot;,helvetica,arial,s=
ans-serif;box-sizing:border-box;font-size:14px;vertical-align:top;border-to=
p:1px solid rgb(238,238,238);padding:5px 0px"><pre style=3D"white-space:pre=
-wrap;font-family:inherit;box-sizing:border-box;font-size:14px;margin-top:0=
px;margin-bottom:0px"><div style=3D"font-family:arial,sans-serif;font-size:=
small;white-space:normal"><table class=3D"gmail-m_1408546303365905243m_-915=
8980618927288472form-items" cellpadding=3D"0" cellspacing=3D"0" style=3D"fo=
nt-family:&quot;helvetica neue&quot;,helvetica,arial,sans-serif;font-size:1=
4px;box-sizing:border-box;width:574.545px;margin:0px"><tbody><tr style=3D"b=
ox-sizing:border-box;font-size:14px;margin:0px"><td valign=3D"top" style=3D=
"font-family:&quot;helvetica neue&quot;,helvetica,arial,sans-serif;box-sizi=
ng:border-box;font-size:14px;vertical-align:top;border-top:1px solid rgb(23=
8,238,238);padding:5px 0px"><pre style=3D"white-space:pre-wrap;font-family:=
inherit;box-sizing:border-box;font-size:14px;margin-top:0px;margin-bottom:0=
px">Hello,</pre><pre style=3D"white-space:pre-wrap;font-family:inherit;box-=
sizing:border-box;font-size:14px;margin-top:0px;margin-bottom:0px"><br></pr=
e><pre style=3D"white-space:pre-wrap;font-family:inherit;box-sizing:border-=
box;font-size:14px;margin-top:0px;margin-bottom:0px">I use currently the OA=
uth technique and I have a question and I hope, you can help me?</pre><pre =
style=3D"white-space:pre-wrap;font-family:inherit;box-sizing:border-box;fon=
t-size:14px;margin-top:0px;margin-bottom:0px"><br></pre><pre style=3D"white=
-space:pre-wrap;font-family:inherit;box-sizing:border-box;font-size:14px;ma=
rgin-top:0px;margin-bottom:0px">I would like to know how can I use OAuth 2.=
0 (within C# WPF application or any langauge to achieve the request) to dow=
nload and upload files from Dropbox. It appears that the OAuth 2.0 works by=
 forwarding you to a Dropbox Platform and getting you confirm details for e=
xample that is means registering the application with external providers(Dr=
opbox Platform API) to get the application key and secret key.</pre><pre st=
yle=3D"white-space:pre-wrap;font-family:inherit;box-sizing:border-box;font-=
size:14px;margin-top:0px;margin-bottom:0px">(creating a new application on =
the Dropbox platform </pre><pre style=3D"white-space:pre-wrap;font-family:i=
nherit;box-sizing:border-box;font-size:14px;margin-top:0px;margin-bottom:0p=
x">to get applicationkey and secret key</pre><pre style=3D"white-space:pre-=
wrap;font-family:inherit;box-sizing:border-box;font-size:14px;margin-top:0p=
x;margin-bottom:0px"> <a href=3D"https://www.dropbox.com/developers/apps/cr=
eate">https://www.dropbox.com/developers/apps/create</a>).</pre><pre style=
=3D"white-space:pre-wrap;font-family:inherit;box-sizing:border-box;font-siz=
e:14px;margin-top:0px;margin-bottom:0px"><br></pre><pre style=3D"white-spac=
e:pre-wrap;font-family:inherit;box-sizing:border-box;font-size:14px;margin-=
top:0px;margin-bottom:0px">How can I use it without application key and sec=
ret key direct to connect and maybe get the application key with secret key=
 in background without showing anything to the user of the application for =
example like &quot;Screenpresso&quot; software with this software you don&#=
39;t need to get applciation key or secret key only you sign in by the emai=
l and password to grant access the features.
 </pre><pre style=3D"white-space:pre-wrap;font-family:inherit;box-sizing:bo=
rder-box;font-size:14px;margin-top:0px;margin-bottom:0px">If there are othe=
r extra techniques, please write them to my email.

Thanks in advance.</pre></td></tr></tbody></table></div><span style=3D"font=
-family:arial,sans-serif;font-size:small;white-space:normal">Best regards,<=
/span><div style=3D"font-family:arial,sans-serif;font-size:small;white-spac=
e:normal"><br></div><div style=3D"font-family:arial,sans-serif;font-size:sm=
all;white-space:normal">Riyadh Biyram</div></pre></td></tr></tbody></table>=
</div><div><br></div><div><div><div class=3D"gmail-m_-1311154674828558033gm=
ail_signature"><div dir=3D"ltr"><div style=3D"color:rgb(100,100,100);font-f=
amily:arial;font-size:14px"><table border=3D"0" cellspacing=3D"0" cellpaddi=
ng=3D"0" width=3D"470" style=3D"color:rgb(0,0,0);font-family:helvetica,aria=
l,sans-serif;font-size:medium;width:470px"><tbody><tr valign=3D"top"><td st=
yle=3D"border-right:1px solid rgb(69,102,142);padding-right:10px;width:10px=
"><img src=3D"https://docs.google.com/uc?export=3Ddownload&amp;id=3D0B0-S6c=
kMz3WaMTFNTFgtNE9rWFk&amp;revid=3D0B0-S6ckMz3WadjlDeUl2M3dqSXArVzlqQS9EeVNE=
Yk9jckVJPQ" width=3D"94" height=3D"96"></td><td style=3D"font-family:arial;=
font-stretch:normal;font-size:14px;color:rgb(100,100,100);padding-left:10px=
"><div><b>Riyadh Biyram</b><br>Software Engineer &amp; Software Developer</=
div><div style=3D"color:rgb(141,141,141);font-size:13px;padding:5px 0px"><s=
pan style=3D"display:inline-block"><span style=3D"color:rgb(69,102,142)">m:=
 =C2=A0</span><a href=3D"tel:555-77777" style=3D"outline:none;color:rgb(141=
,141,141);text-decoration:none" target=3D"_blank">+</a>49 (0) 1577 858 6688=
 =C2=A0 </span>| =C2=A0 =C2=A0<span style=3D"display:inline-block"><span st=
yle=3D"color:rgb(69,102,142)">e:</span></span>rb50575<span style=3D"display=
:inline-block"><a href=3D"mailto:riyadh.biyram@gmail.com" style=3D"outline:=
none;color:rgb(141,141,141);text-decoration:none" target=3D"_blank">@gmail.=
com</a></span>=C2=A0<span style=3D"white-space:nowrap;display:inline-block"=
><span style=3D"color:rgb(69,102,142)">Skype :</span></span>riyadh.biyram<s=
pan style=3D"color:rgb(69,102,142)">=C2=A0</span></div></td></tr></tbody></=
table></div></div></div></div>
</div></div>

--001a1149b9a80dc79605443dddf1--


From nobody Tue Dec 27 09:52:43 2016
Return-Path: <jim@manicode.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AF279129670 for <oauth@ietfa.amsl.com>; Tue, 27 Dec 2016 09:52:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=manicode-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zV8Trx24z8Cd for <oauth@ietfa.amsl.com>; Tue, 27 Dec 2016 09:52:40 -0800 (PST)
Received: from mail-pg0-x231.google.com (mail-pg0-x231.google.com [IPv6:2607:f8b0:400e:c05::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 316AD12950F for <oauth@ietf.org>; Tue, 27 Dec 2016 09:52:40 -0800 (PST)
Received: by mail-pg0-x231.google.com with SMTP id g1so107842113pgn.0 for <oauth@ietf.org>; Tue, 27 Dec 2016 09:52:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=manicode-com.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=8+Um9wt/x6c24UPMJQMb/elUHiDQIdNiaEwuaXitQNw=; b=jIEWf1Zhq06fLdKgRkIDSrxak3xQJutY2QWSFimRqH1qoRfH2iBxQTaSymgRvXsOti LKPfuszKfA842lJMnrWpJ3/G/6ZGoXbuFR7ueE4FyAAIlCiuC4jOcgtxC537+qpP1KLs oFh4Jw4dlhM7pwuIA10V+HEznGHcnDb6EjbP5LGc63jvGG/nY2bMI445thZWcNUIy0Lu DBl6Z9qijRKXon0FnxInJudXm30AkcsoaCiWLY57FPtzrIMPboUJBc1/gF5vk65KL0mY yFZM/NCyZwaynkBcJ2s+mBV1yuEDzAvybAfhYRaAW6cRzNsVnzySJRtLd1ul+2jFdLbv wTzA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=8+Um9wt/x6c24UPMJQMb/elUHiDQIdNiaEwuaXitQNw=; b=T8P+YhUGojgjfCtfYo0gShipmUUaau+ZuE9v6Y50WdrB5Fg44HcQA8nJv+Io5nnndm 6uhr8MKSmH3My9C/2BhXcJbPFR5dg7OepIWkYu3OgAWBbWkkFuu9jue+1Sv7Lteiy96G FH9kNVpTlFFpp3d+dkqo8eVitP2a1wC0JU19J3t9OkRP+Qvt7/DUw3LZqNOz7J9soOUl fEhHLzvvx3Fp1RkTvcLf6Zq3rpRzMjLE5X+CaPej7GA9/0ajUO9DWBTRlgJdUqW/Sacw BsvFa0u+TL5uYn6sW7/8d/lgHBv4bU6KCG4WEw1KQvB6jvrmoAVoyGPRmPcSE9YJCYSk U0QA==
X-Gm-Message-State: AIkVDXJ0aYq6WRO5IyBnOru8Kn7Yrx4eCLoVP+IRHbvnh3VKLQ56tDnHI6fhl7aIarMbgj47
X-Received: by 10.84.133.129 with SMTP id f1mr67959283plf.64.1482861159556; Tue, 27 Dec 2016 09:52:39 -0800 (PST)
Received: from [10.108.31.69] (mobile-166-171-120-021.mycingular.net. [166.171.120.21]) by smtp.gmail.com with ESMTPSA id j68sm91041649pfk.95.2016.12.27.09.52.38 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 27 Dec 2016 09:52:38 -0800 (PST)
Content-Type: multipart/alternative; boundary=Apple-Mail-4B09806A-F63A-4ABD-93F8-5B488EE1835B
Mime-Version: 1.0 (1.0)
From: Jim Manico <jim@manicode.com>
X-Mailer: iPhone Mail (14C92)
In-Reply-To: <CAGDd68OKHdMxKJFcR4T+grrL48-2Z1HqH3BNSNSesxHqGgWL5Q@mail.gmail.com>
Date: Tue, 27 Dec 2016 07:52:37 -1000
Content-Transfer-Encoding: 7bit
Message-Id: <0623184E-6E50-4301-8499-3F2459E3E377@manicode.com>
References: <CAGDd68OKHdMxKJFcR4T+grrL48-2Z1HqH3BNSNSesxHqGgWL5Q@mail.gmail.com>
To: Riyadh Biyram <riyadh.biyram@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/YZMt72NdgDij1W5aWpOzHTyaT3k>
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Downloading and uploading files by using OAuth in C# language on the Dropbox Platform without creating a new app on the Dropbox Platform to get applicationkey and secretkey?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Dec 2016 17:52:42 -0000

--Apple-Mail-4B09806A-F63A-4ABD-93F8-5B488EE1835B
Content-Type: text/plain;
	charset=us-ascii
Content-Transfer-Encoding: quoted-printable

Riyadh,

You best off reading the Dropbox OAuth guide and asking Dropbox support with=
 your questions. Each provider does OAuth a little bit differently.

https://www.dropbox.com/developers/reference/oauth-guide

Respectfully,
--
Jim Manico
@Manicode

> On Dec 22, 2016, at 1:49 AM, Riyadh Biyram <riyadh.biyram@gmail.com> wrote=
:
>=20
>=20
> Hello,
>=20
> I use currently the OAuth technique and I have a question and I hope, you c=
an help me?
>=20
> I would like to know how can I use OAuth 2.0 (within C# WPF application or=
 any langauge to achieve the request) to download and upload files from Drop=
box. It appears that the OAuth 2.0 works by forwarding you to a Dropbox Plat=
form and getting you confirm details for example that is means registering t=
he application with external providers(Dropbox Platform API) to get the appl=
ication key and secret key.
> (creating a new application on the Dropbox platform=20
> to get applicationkey and secret key
>  https://www.dropbox.com/developers/apps/create).
>=20
> How can I use it without application key and secret key direct to connect a=
nd maybe get the application key with secret key in background without showi=
ng anything to the user of the application for example like "Screenpresso" s=
oftware with this software you don't need to get applciation key or secret k=
ey only you sign in by the email and password to grant access the features.
> =20
> If there are other extra techniques, please write them to my email.
>=20
> Thanks in advance.
> Best regards,
>=20
> Riyadh Biyram
>=20
> =09
> Riyadh Biyram
> Software Engineer & Software Developer
> m:  +49 (0) 1577 858 6688   |    e:rb50575@gmail.com Skype :riyadh.biyram=20=

> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

--Apple-Mail-4B09806A-F63A-4ABD-93F8-5B488EE1835B
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div>Riyadh,</div><div id=3D"AppleMailSigna=
ture"><br></div><div id=3D"AppleMailSignature">You best off reading the Drop=
box OAuth guide and asking Dropbox support with your questions. Each provide=
r does OAuth a little bit differently.</div><div id=3D"AppleMailSignature"><=
br></div><div id=3D"AppleMailSignature"><a href=3D"https://www.dropbox.com/d=
evelopers/reference/oauth-guide">https://www.dropbox.com/developers/referenc=
e/oauth-guide</a></div><div id=3D"AppleMailSignature"><br>Respectfully,<br><=
div>--</div><div>Jim Manico</div><div>@Manicode</div></div><div><br>On Dec 2=
2, 2016, at 1:49 AM, Riyadh Biyram &lt;<a href=3D"mailto:riyadh.biyram@gmail=
.com">riyadh.biyram@gmail.com</a>&gt; wrote:<br><br></div><blockquote type=3D=
"cite"><div><div dir=3D"ltr"><div></div><div></div><div><table class=3D"gmai=
l-m_1408546303365905243m_-9158980618927288472form-items" cellpadding=3D"0" c=
ellspacing=3D"0" style=3D"font-family:&quot;helvetica neue&quot;,helvetica,a=
rial,sans-serif;font-size:14px;box-sizing:border-box;width:574.545px;margin:=
0px"><tbody><tr style=3D"box-sizing:border-box;font-size:14px;margin:0px"><t=
d valign=3D"top" style=3D"font-family:&quot;helvetica neue&quot;,helvetica,a=
rial,sans-serif;box-sizing:border-box;font-size:14px;vertical-align:top;bord=
er-top:1px solid rgb(238,238,238);padding:5px 0px"><pre style=3D"white-space=
:pre-wrap;font-family:inherit;box-sizing:border-box;font-size:14px;margin-to=
p:0px;margin-bottom:0px"><div style=3D"font-family:arial,sans-serif;font-siz=
e:small;white-space:normal"><table class=3D"gmail-m_1408546303365905243m_-91=
58980618927288472form-items" cellpadding=3D"0" cellspacing=3D"0" style=3D"fo=
nt-family:&quot;helvetica neue&quot;,helvetica,arial,sans-serif;font-size:14=
px;box-sizing:border-box;width:574.545px;margin:0px"><tbody><tr style=3D"box=
-sizing:border-box;font-size:14px;margin:0px"><td valign=3D"top" style=3D"fo=
nt-family:&quot;helvetica neue&quot;,helvetica,arial,sans-serif;box-sizing:b=
order-box;font-size:14px;vertical-align:top;border-top:1px solid rgb(238,238=
,238);padding:5px 0px"><pre style=3D"white-space:pre-wrap;font-family:inheri=
t;box-sizing:border-box;font-size:14px;margin-top:0px;margin-bottom:0px">Hel=
lo,</pre><pre style=3D"white-space:pre-wrap;font-family:inherit;box-sizing:b=
order-box;font-size:14px;margin-top:0px;margin-bottom:0px"><br></pre><pre st=
yle=3D"white-space:pre-wrap;font-family:inherit;box-sizing:border-box;font-s=
ize:14px;margin-top:0px;margin-bottom:0px">I use currently the OAuth techniq=
ue and I have a question and I hope, you can help me?</pre><pre style=3D"whi=
te-space:pre-wrap;font-family:inherit;box-sizing:border-box;font-size:14px;m=
argin-top:0px;margin-bottom:0px"><br></pre><pre style=3D"white-space:pre-wra=
p;font-family:inherit;box-sizing:border-box;font-size:14px;margin-top:0px;ma=
rgin-bottom:0px">I would like to know how can I use OAuth 2.0 (within C# WPF=
 application or any langauge to achieve the request) to download and upload f=
iles from Dropbox. It appears that the OAuth 2.0 works by forwarding you to a=
 Dropbox Platform and getting you confirm details for example that is means r=
egistering the application with external providers(Dropbox Platform API) to g=
et the application key and secret key.</pre><pre style=3D"white-space:pre-wr=
ap;font-family:inherit;box-sizing:border-box;font-size:14px;margin-top:0px;m=
argin-bottom:0px">(creating a new application on the Dropbox platform </pre>=
<pre style=3D"white-space:pre-wrap;font-family:inherit;box-sizing:border-box=
;font-size:14px;margin-top:0px;margin-bottom:0px">to get applicationkey and s=
ecret key</pre><pre style=3D"white-space:pre-wrap;font-family:inherit;box-si=
zing:border-box;font-size:14px;margin-top:0px;margin-bottom:0px"> <a href=3D=
"https://www.dropbox.com/developers/apps/create">https://www.dropbox.com/dev=
elopers/apps/create</a>).</pre><pre style=3D"white-space:pre-wrap;font-famil=
y:inherit;box-sizing:border-box;font-size:14px;margin-top:0px;margin-bottom:=
0px"><br></pre><pre style=3D"white-space:pre-wrap;font-family:inherit;box-si=
zing:border-box;font-size:14px;margin-top:0px;margin-bottom:0px">How can I u=
se it without application key and secret key direct to connect and maybe get=
 the application key with secret key in background without showing anything t=
o the user of the application for example like "Screenpresso" software with t=
his software you don't need to get applciation key or secret key only you si=
gn in by the email and password to grant access the features.
 </pre><pre style=3D"white-space:pre-wrap;font-family:inherit;box-sizing:bor=
der-box;font-size:14px;margin-top:0px;margin-bottom:0px">If there are other e=
xtra techniques, please write them to my email.

Thanks in advance.</pre></td></tr></tbody></table></div><span style=3D"font-=
family:arial,sans-serif;font-size:small;white-space:normal">Best regards,</s=
pan><div style=3D"font-family:arial,sans-serif;font-size:small;white-space:n=
ormal"><br></div><div style=3D"font-family:arial,sans-serif;font-size:small;=
white-space:normal">Riyadh Biyram</div></pre></td></tr></tbody></table></div=
><div><br></div><div><div><div class=3D"gmail-m_-1311154674828558033gmail_si=
gnature"><div dir=3D"ltr"><div style=3D"color:rgb(100,100,100);font-family:a=
rial;font-size:14px"><table border=3D"0" cellspacing=3D"0" cellpadding=3D"0"=
 width=3D"470" style=3D"color:rgb(0,0,0);font-family:helvetica,arial,sans-se=
rif;font-size:medium;width:470px"><tbody><tr valign=3D"top"><td style=3D"bor=
der-right:1px solid rgb(69,102,142);padding-right:10px;width:10px"><img src=3D=
"https://docs.google.com/uc?export=3Ddownload&amp;id=3D0B0-S6ckMz3WaMTFNTFgt=
NE9rWFk&amp;revid=3D0B0-S6ckMz3WadjlDeUl2M3dqSXArVzlqQS9EeVNEYk9jckVJPQ" wid=
th=3D"94" height=3D"96"></td><td style=3D"font-family:arial;font-stretch:nor=
mal;font-size:14px;color:rgb(100,100,100);padding-left:10px"><div><b>Riyadh B=
iyram</b><br>Software Engineer &amp; Software Developer</div><div style=3D"c=
olor:rgb(141,141,141);font-size:13px;padding:5px 0px"><span style=3D"display=
:inline-block"><span style=3D"color:rgb(69,102,142)">m: &nbsp;</span><a href=
=3D"tel:555-77777" style=3D"outline:none;color:rgb(141,141,141);text-decorat=
ion:none" target=3D"_blank">+</a>49 (0) 1577 858 6688 &nbsp; </span>| &nbsp;=
 &nbsp;<span style=3D"display:inline-block"><span style=3D"color:rgb(69,102,=
142)">e:</span></span>rb50575<span style=3D"display:inline-block"><a href=3D=
"mailto:riyadh.biyram@gmail.com" style=3D"outline:none;color:rgb(141,141,141=
);text-decoration:none" target=3D"_blank">@gmail.com</a></span>&nbsp;<span s=
tyle=3D"white-space:nowrap;display:inline-block"><span style=3D"color:rgb(69=
,102,142)">Skype :</span></span>riyadh.biyram<span style=3D"color:rgb(69,102=
,142)">&nbsp;</span></div></td></tr></tbody></table></div></div></div></div>=

</div></div>
</div></blockquote><blockquote type=3D"cite"><div><span>____________________=
___________________________</span><br><span>OAuth mailing list</span><br><sp=
an><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a></span><br><span><a h=
ref=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mai=
lman/listinfo/oauth</a></span><br></div></blockquote></body></html>=

--Apple-Mail-4B09806A-F63A-4ABD-93F8-5B488EE1835B--


From nobody Tue Dec 27 16:57:21 2016
Return-Path: <sakimura@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 93118129450 for <oauth@ietfa.amsl.com>; Tue, 27 Dec 2016 16:57:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6cabhKyzbXJ4 for <oauth@ietfa.amsl.com>; Tue, 27 Dec 2016 16:57:19 -0800 (PST)
Received: from mail-wm0-x233.google.com (mail-wm0-x233.google.com [IPv6:2a00:1450:400c:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B737D129432 for <oauth@ietf.org>; Tue, 27 Dec 2016 16:57:18 -0800 (PST)
Received: by mail-wm0-x233.google.com with SMTP id u144so72632923wmu.1 for <oauth@ietf.org>; Tue, 27 Dec 2016 16:57:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=hzxZAzlZvp7295tTUI1CKgBJGTQIJmHFh3JpO45Lea4=; b=kr2rlysgRoNkIjkKFcd8zHqR7Ypmcv7/869/8qEISCvS2ytfGZwlSVs+sWck1Y5yi2 HaAWQvvn/qySBpJ3QwdxZ8p1FAteEO1rVSaopHhnuVVAaWdGToSu9A7mCJTOnUFihzgj iKTHZsUiSOPJJEloNNDo1tb9bhzjjUo2p8gdLpiaYp3LlRUdRq8vBVX9CgH1mHJYm+QR ejQ7QoAPY84n13ocUOK2Hpn2gA/evtCxRoFqC3JHGmf0doB8hd/xW9p5kIsrbptThoSs Jq8JdMUHfB73nFHe8rwX6j4rHVijIXYEv6KTpT/bTxR3NRpm9hrZuVYxqmIyahrCiRjR HyNw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=hzxZAzlZvp7295tTUI1CKgBJGTQIJmHFh3JpO45Lea4=; b=nZb62h4POwhP04Q7K06cKibBVEIaBsI8C7peYvhb2x8UIV3/6D/DasMRW3GHSi42j9 upiF7yMYK4GzrB/2P6cK0YSkgp1EC/D1U+Ty5ECGdOi+PXiFtdGqUsZil5ts8+KkzJWW k7n0cP6EgvVAvgFiYLOVcJY+BQaTF5G37VH6kpSEldcY+hNhLGVyZWyTIbyerVu0ClVG YMxTb0zVmtn3UTbpFH8bdP0efLhpJKd/f0suCKOAajbszTLPq8uGpfzU9TeJF62wnh42 iie2zM/U0WiPwtARxWhwRAY3cfz1wI54goQ6J8sZ7ceOynEbf0afLM8m3podO2poFm6J IYtg==
X-Gm-Message-State: AIkVDXK8wktpS5wCoqZsfc3mws9n2rSM4fpEk7ZEqRnvlsyFuQV0tmmxlEuZdBOwO459fITYW7094NMJJcgQSw==
X-Received: by 10.28.184.23 with SMTP id i23mr35320628wmf.66.1482886637171; Tue, 27 Dec 2016 16:57:17 -0800 (PST)
MIME-Version: 1.0
References: <CAHbuEH4Vxdda4yUH932GEZjEiLi1KdYU9_1MLoLAn_AZA=41Yw@mail.gmail.com>
In-Reply-To: <CAHbuEH4Vxdda4yUH932GEZjEiLi1KdYU9_1MLoLAn_AZA=41Yw@mail.gmail.com>
From: Nat Sakimura <sakimura@gmail.com>
Date: Wed, 28 Dec 2016 00:57:05 +0000
Message-ID: <CABzCy2BoAYtpsbU6Pi3rimVOdQcsop=P5k3-+9BLoNXmi8Pc9w@mail.gmail.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, "oauth@ietf.org" <oauth@ietf.org>
Content-Type: multipart/alternative; boundary=001a114b771c403a5f0544ad738d
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/JmiUskbudpdAe268iwXZTTrUgwE>
Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-jwsreq
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Dec 2016 00:57:20 -0000

--001a114b771c403a5f0544ad738d
Content-Type: text/plain; charset=UTF-8

Hi

Sorry to have taken so long to respond -- too much travel.

My responses inline.

On Sat, Oct 29, 2016 at 12:39 AM Kathleen Moriarty <
kathleen.moriarty.ietf@gmail.com> wrote:

> Hello,
>
> I just reviewed draft-ietf-oauth-jwsreq, and it looks great and seems to
> be a nice addition to help with security.  Thanks for your work on it.
>
> I only have a few comments.
>
> The first is just about some wording that is awkward in the TLS section.
>
> What's there now:
>
> Client implementations supporting the Request Object URI method MUST
>    support TLS as recommended in Recommendations for Secure Use of
>    Transport Layer Security (TLS) and Datagram Transport Layer Security
>    (DTLS) [RFC7525].
>
> How about:
>
> Client implementations supporting the Request Object URI method MUST
>    support TLS following Recommendations for Secure Use of
>    Transport Layer Security (TLS) and Datagram Transport Layer Security
>    (DTLS) [RFC7525].
>
> Not a major change and just editorial, so take it or leave it.
>

Accepted as presented in my personal copy.
See: https://bitbucket.org/Nat/oauth-jwsreq/commits/0de915b22f13


>
> 2. In section 10, the introduction sentence leaves me wondering where the
> additional attacks against OAuth 2.0 should also have a pointer in this
> sentence:
>
>    In addition to the all the security considerations discussed in OAuth
>    2.0 [RFC6819], the following security considerations should be taken
>    into account.
>
>
>
An IETF document about them has not been adopted yet. Shall I just add a
sentence or two describing the threats that each sub-sections are dealing
with? Or shall I point to the research papers that I was reading? (Some of
them are not freely available though.)


> 3. Nit: in first line of 10.4:
>
> Although this specification does not require them, researchs
>
> s/researchs/researchers/
>

In fact, I meant either "research" or "researches" as I was not pointing to
persons but rather the work done by them.
I fixed it as "research" in my personal copy.
See: https://bitbucket.org/Nat/oauth-jwsreq/commits/0ec83d0c0c36


> 4. I'm sure you'll be asked about the following:
>
>    ISO/IEC 29100
>    [ISO29100] is a freely accessible International Standard and its
>    Privacy Principles are good to follow.
>
> What about the IETF privacy considerations for protocols, RFC6973, were
> they also considered?  I think you are covering what's needed, but no
> mention of it and favoring an ISO standard seems odd., using both is fine.
>

Good point. ISO/IEC 29100 is a high level document so the coverage is wider
but does not get into concrete details where as RFC6973 gives more concrete
guidance.  They complement each other. I have added a paragraph about
RFC6873 in my personal copy.

See: https://bitbucket.org/Nat/oauth-jwsreq/commits/9030e1be5cac


> Thank you.
> --
>
> Best regards,
> Kathleen
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
-- 

Nat Sakimura

Chairman of the Board, OpenID Foundation

--001a114b771c403a5f0544ad738d
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi<div><br></div><div>Sorry to have taken so long to respo=
nd -- too much travel.=C2=A0</div><div><br></div><div>My responses inline.=
=C2=A0</div><br><div class=3D"gmail_quote"><div dir=3D"ltr">On Sat, Oct 29,=
 2016 at 12:39 AM Kathleen Moriarty &lt;<a href=3D"mailto:kathleen.moriarty=
.ietf@gmail.com">kathleen.moriarty.ietf@gmail.com</a>&gt; wrote:<br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px=
 #ccc solid;padding-left:1ex"><div dir=3D"ltr" class=3D"gmail_msg">Hello,<d=
iv class=3D"gmail_msg"><br class=3D"gmail_msg"></div><div class=3D"gmail_ms=
g">I just reviewed draft-ietf-oauth-jwsreq, and it looks great and seems to=
 be a nice addition to help with security.=C2=A0 Thanks for your work on it=
.</div><div class=3D"gmail_msg"><br class=3D"gmail_msg"></div><div class=3D=
"gmail_msg">I only have a few comments.</div><div class=3D"gmail_msg"><br c=
lass=3D"gmail_msg"></div><div class=3D"gmail_msg">The first is just about s=
ome wording that is awkward in the TLS section.</div><div class=3D"gmail_ms=
g"><br class=3D"gmail_msg"></div><div class=3D"gmail_msg">What&#39;s there =
now:</div><div class=3D"gmail_msg"><pre style=3D"box-sizing:border-box;over=
flow:auto;font-family:&#39;pt mono&#39;,monaco,monospace;font-size:14px;pad=
ding:10px;margin-top:0px;margin-bottom:10.5px;line-height:1.214;color:rgb(0=
,0,0);word-break:break-all;word-wrap:break-word;border:1px solid rgb(204,20=
4,204);border-radius:4px;background-color:rgb(255,253,245)" class=3D"gmail_=
msg">Client implementations supporting the Request Object URI method MUST
   support TLS as recommended in Recommendations for Secure Use of
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) [RFC7525].</pre><pre style=3D"box-sizing:border-box;overflow:auto=
;font-family:&#39;pt mono&#39;,monaco,monospace;font-size:14px;padding:10px=
;margin-top:0px;margin-bottom:10.5px;line-height:1.214;color:rgb(0,0,0);wor=
d-break:break-all;word-wrap:break-word;border:1px solid rgb(204,204,204);bo=
rder-radius:4px;background-color:rgb(255,253,245)" class=3D"gmail_msg"><spa=
n style=3D"line-height:1.214" class=3D"gmail_msg">How about:</span></pre><p=
re style=3D"box-sizing:border-box;overflow:auto;font-family:&#39;pt mono&#3=
9;,monaco,monospace;font-size:14px;padding:10px;margin-top:0px;margin-botto=
m:10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-wrap:=
break-word;border:1px solid rgb(204,204,204);border-radius:4px;background-c=
olor:rgb(255,253,245)" class=3D"gmail_msg"><pre style=3D"box-sizing:border-=
box;overflow:auto;font-family:&#39;pt mono&#39;,monaco,monospace;padding:10=
px;margin-top:0px;margin-bottom:10.5px;line-height:1.214;word-break:break-a=
ll;word-wrap:break-word;border:1px solid rgb(204,204,204);border-radius:4px=
" class=3D"gmail_msg">Client implementations supporting the Request Object =
URI method MUST
   support TLS following Recommendations for Secure Use of
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) [RFC7525].</pre></pre><div class=3D"gmail_msg">Not a major change=
 and just editorial, so take it or leave it.</div></div></div></blockquote>=
<div><br></div><div>Accepted as presented in my personal copy.=C2=A0</div><=
div>See:=C2=A0<a href=3D"https://bitbucket.org/Nat/oauth-jwsreq/commits/0de=
915b22f13">https://bitbucket.org/Nat/oauth-jwsreq/commits/0de915b22f13</a><=
/div><div>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr" c=
lass=3D"gmail_msg"><div class=3D"gmail_msg"><div class=3D"gmail_msg"><br cl=
ass=3D"gmail_msg"></div><div class=3D"gmail_msg">2. In section 10, the intr=
oduction sentence leaves me wondering where the additional attacks against =
OAuth 2.0 should also have a pointer in this sentence:</div><div class=3D"g=
mail_msg"><br class=3D"gmail_msg"></div><div class=3D"gmail_msg"><pre style=
=3D"box-sizing:border-box;overflow:auto;font-family:&#39;pt mono&#39;,monac=
o,monospace;font-size:14px;padding:10px;margin-top:0px;margin-bottom:10.5px=
;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-wrap:break-wo=
rd;border:1px solid rgb(204,204,204);border-radius:4px;background-color:rgb=
(255,253,245)" class=3D"gmail_msg">   In addition to the all the security c=
onsiderations discussed in OAuth
   2.0 [RFC6819], the following security considerations should be taken
   into account.</pre></div><div class=3D"gmail_msg"><br class=3D"gmail_msg=
"></div></div></div></blockquote><div><br></div><div>An IETF document about=
 them has not been adopted yet. Shall I just add a sentence or two describi=
ng the threats that each sub-sections are dealing with? Or shall I point to=
 the research papers that I was reading? (Some of them are not freely avail=
able though.)=C2=A0</div><div>=C2=A0</div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><d=
iv dir=3D"ltr" class=3D"gmail_msg"><div class=3D"gmail_msg"><div class=3D"g=
mail_msg"></div><div class=3D"gmail_msg">3. Nit: in first line of 10.4:</di=
v><div class=3D"gmail_msg"><pre style=3D"box-sizing:border-box;overflow:aut=
o;font-family:&#39;pt mono&#39;,monaco,monospace;font-size:14px;padding:10p=
x;margin-top:0px;margin-bottom:10.5px;line-height:1.214;color:rgb(0,0,0);wo=
rd-break:break-all;word-wrap:break-word;border:1px solid rgb(204,204,204);b=
order-radius:4px;background-color:rgb(255,253,245)" class=3D"gmail_msg">Alt=
hough this specification does not require them, researchs</pre></div><div c=
lass=3D"gmail_msg">s/researchs/researchers/</div></div></div></blockquote><=
div><br></div><div>In fact, I meant either &quot;research&quot; or &quot;re=
searches&quot; as I was not pointing to persons but rather the work done by=
 them.=C2=A0</div><div>I fixed it as &quot;research&quot; in my personal co=
py.=C2=A0</div><div>See:=C2=A0<a href=3D"https://bitbucket.org/Nat/oauth-jw=
sreq/commits/0ec83d0c0c36">https://bitbucket.org/Nat/oauth-jwsreq/commits/0=
ec83d0c0c36</a></div><div><br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=
=3D"ltr" class=3D"gmail_msg"><div class=3D"gmail_msg"><div class=3D"gmail_m=
sg"><br class=3D"gmail_msg"></div><div class=3D"gmail_msg">4. I&#39;m sure =
you&#39;ll be asked about the following:</div><div class=3D"gmail_msg"><pre=
 style=3D"box-sizing:border-box;overflow:auto;font-family:&#39;pt mono&#39;=
,monaco,monospace;font-size:14px;padding:10px;margin-top:0px;margin-bottom:=
10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-wrap:br=
eak-word;border:1px solid rgb(204,204,204);border-radius:4px;background-col=
or:rgb(255,253,245)" class=3D"gmail_msg">   ISO/IEC 29100
   [ISO29100] is a freely accessible International Standard and its
   Privacy Principles are good to follow.</pre></div><div class=3D"gmail_ms=
g">What about the IETF privacy considerations for protocols, RFC6973, were =
they also considered?=C2=A0 I think you are covering what&#39;s needed, but=
 no mention of it and favoring an ISO standard seems odd., using both is fi=
ne.=C2=A0</div></div></div></blockquote><div><br></div><div>Good point. ISO=
/IEC 29100 is a high level document so the coverage is wider but does not g=
et into concrete details where as RFC6973 gives more concrete guidance.=C2=
=A0 They complement each other. I have added a paragraph about RFC6873 in m=
y personal copy.=C2=A0</div><div><br></div><div>See:=C2=A0<a href=3D"https:=
//bitbucket.org/Nat/oauth-jwsreq/commits/9030e1be5cac">https://bitbucket.or=
g/Nat/oauth-jwsreq/commits/9030e1be5cac</a></div><div><br></div><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex"><div dir=3D"ltr" class=3D"gmail_msg"><div class=3D"gmai=
l_msg"><div class=3D"gmail_msg"><br class=3D"gmail_msg"></div><div class=3D=
"gmail_msg">Thank you.</div>-- <br class=3D"gmail_msg"><div class=3D"m_6248=
470965839308522gmail_signature gmail_msg"><div dir=3D"ltr" class=3D"gmail_m=
sg"><br class=3D"gmail_msg"><div class=3D"gmail_msg">Best regards,</div><di=
v class=3D"gmail_msg">Kathleen</div></div></div>
</div></div>
_______________________________________________<br class=3D"gmail_msg">
OAuth mailing list<br class=3D"gmail_msg">
<a href=3D"mailto:OAuth@ietf.org" class=3D"gmail_msg" target=3D"_blank">OAu=
th@ietf.org</a><br class=3D"gmail_msg">
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
class=3D"gmail_msg" target=3D"_blank">https://www.ietf.org/mailman/listinfo=
/oauth</a><br class=3D"gmail_msg">
</blockquote></div></div><div dir=3D"ltr">-- <br></div><div data-smartmail=
=3D"gmail_signature"><p dir=3D"ltr">Nat Sakimura</p>
<p dir=3D"ltr">Chairman of the Board, OpenID Foundation</p>
</div>

--001a114b771c403a5f0544ad738d--


From nobody Wed Dec 28 08:27:13 2016
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4951312944A for <oauth@ietfa.amsl.com>; Wed, 28 Dec 2016 08:27:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c2W9Aacl5Is6 for <oauth@ietfa.amsl.com>; Wed, 28 Dec 2016 08:27:09 -0800 (PST)
Received: from mail-qk0-x22d.google.com (mail-qk0-x22d.google.com [IPv6:2607:f8b0:400d:c09::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38801129407 for <oauth@ietf.org>; Wed, 28 Dec 2016 08:27:09 -0800 (PST)
Received: by mail-qk0-x22d.google.com with SMTP id h201so109956294qke.1 for <oauth@ietf.org>; Wed, 28 Dec 2016 08:27:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=J3E6xFD5VJWIPrhhb5STHYx0fKxunCyeHJ8EsUsdxJw=; b=QDUco7MdcMxnc5IldfMbIIIiKurQyd1pwuVBlDVWdaF7+EVWnUripAFYqm9tvdAucj cOKMTwnx6zw9OgcnooRMRr1bNpcjz5WwMmZKrd5v5EybDUtko+pbV0gW9/oiJx/YrR0m HEAN5Xt7oKOQMlUs8n6qmqCu3i3vBgxD38k7ta9AeAw98NmyNVh4svqo+dM/ArRnA6OE JKTsoypLlH7A5w2qiTAfA/kkPVxV+4PTxvCrAeJaWsHdlpVKC6m579/Fzw1U6dzMxXTb 7A6fXs7sXDoGslIXX6lPM3OKi7rFASRH51FpGNTa7uw39CzEQrer9fJqMIv3pIJpF8J6 5Y1w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=J3E6xFD5VJWIPrhhb5STHYx0fKxunCyeHJ8EsUsdxJw=; b=OnWS8rwBwP0cGDw8g3kqt/FOLiCH63UdWbxkSgnzxngM79Rzs/azFBf7vym+uQSkp1 5LoMpx4SH3L7920P95eLEHx1cOSUr2TduYLijM7bstAAqDCUNYzGDg6rQbDZ68vlDy7K Kxqy+fo84gApB8IhE4HLVg8gfuBXEAYd4LCkjwCPbRX9F3/QeS7FB5MpJD67hJpFoAt3 LEECXX98b3fQob35F+UC7VHdZeezNPJ0PkmMwDzTc4LEWglaq3d76pdYY8sZeXJJtjk+ sJnjEf/ozAgzHd27F7GMPWmMo7NRwCsqk1UOLabRjNTWyvuY21jzIDbN0ZFf2O2rXRcl uO+w==
X-Gm-Message-State: AIkVDXKffiz3Y9zncOD8+4SfeP3JbLAgLk3SgLMHV+irwve4sdUDdHlqSWgShE59kv5GV44QbMZiFFouis4eyA==
X-Received: by 10.55.198.149 with SMTP id s21mr39656938qkl.196.1482942428405;  Wed, 28 Dec 2016 08:27:08 -0800 (PST)
MIME-Version: 1.0
Received: by 10.12.161.101 with HTTP; Wed, 28 Dec 2016 08:27:08 -0800 (PST)
In-Reply-To: <CABzCy2BoAYtpsbU6Pi3rimVOdQcsop=P5k3-+9BLoNXmi8Pc9w@mail.gmail.com>
References: <CAHbuEH4Vxdda4yUH932GEZjEiLi1KdYU9_1MLoLAn_AZA=41Yw@mail.gmail.com> <CABzCy2BoAYtpsbU6Pi3rimVOdQcsop=P5k3-+9BLoNXmi8Pc9w@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Wed, 28 Dec 2016 11:27:08 -0500
Message-ID: <CAHbuEH7Y=O6e65mpuq1_PQZREiRgsW7UR0jLdKhGcvMm3fcoKw@mail.gmail.com>
To: Nat Sakimura <sakimura@gmail.com>
Content-Type: multipart/alternative; boundary=001a11451488aae6580544ba7037
Archived-At: <https://mailarchive.ietf.org/arch/msg/oauth/Z3HX_A_lddIbGz1Cs2a1IMsvigM>
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] AD review of draft-ietf-oauth-jwsreq
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/oauth/>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Dec 2016 16:27:11 -0000

--001a11451488aae6580544ba7037
Content-Type: text/plain; charset=UTF-8

Hi Nat,

Thank you for the updates.  Please let me know when you publish a new
version.  I'll start last call after the new year.  inline.

On Tue, Dec 27, 2016 at 7:57 PM, Nat Sakimura <sakimura@gmail.com> wrote:

> Hi
>
> Sorry to have taken so long to respond -- too much travel.
>

I hope you are able to rest a bit!


>
> My responses inline.
>
> On Sat, Oct 29, 2016 at 12:39 AM Kathleen Moriarty <
> kathleen.moriarty.ietf@gmail.com> wrote:
>
>> Hello,
>>
>> I just reviewed draft-ietf-oauth-jwsreq, and it looks great and seems to
>> be a nice addition to help with security.  Thanks for your work on it.
>>
>> I only have a few comments.
>>
>> The first is just about some wording that is awkward in the TLS section.
>>
>> What's there now:
>>
>> Client implementations supporting the Request Object URI method MUST
>>    support TLS as recommended in Recommendations for Secure Use of
>>    Transport Layer Security (TLS) and Datagram Transport Layer Security
>>    (DTLS) [RFC7525].
>>
>> How about:
>>
>> Client implementations supporting the Request Object URI method MUST
>>    support TLS following Recommendations for Secure Use of
>>    Transport Layer Security (TLS) and Datagram Transport Layer Security
>>    (DTLS) [RFC7525].
>>
>> Not a major change and just editorial, so take it or leave it.
>>
>
> Accepted as presented in my personal copy.
> See: https://bitbucket.org/Nat/oauth-jwsreq/commits/0de915b22f13
>
>
>>
>> 2. In section 10, the introduction sentence leaves me wondering where the
>> additional attacks against OAuth 2.0 should also have a pointer in this
>> sentence:
>>
>>    In addition to the all the security considerations discussed in OAuth
>>    2.0 [RFC6819], the following security considerations should be taken
>>    into account.
>>
>>
>>
> An IETF document about them has not been adopted yet. Shall I just add a
> sentence or two describing the threats that each sub-sections are dealing
> with? Or shall I point to the research papers that I was reading? (Some of
> them are not freely available though.)
>

Any document that describes them will likely be an 'updates' to the OAuth
spec, so we should be okay.  Is the WG likely to adopt a draft soon?  If
so, we could wait to start IETF last call.


>
>> 3. Nit: in first line of 10.4:
>>
>> Although this specification does not require them, researchs
>>
>> s/researchs/researchers/
>>
>
> In fact, I meant either "research" or "researches" as I was not pointing
> to persons but rather the work done by them.
> I fixed it as "research" in my personal copy.
> See: https://bitbucket.org/Nat/oauth-jwsreq/commits/0ec83d0c0c36
>
>
>> 4. I'm sure you'll be asked about the following:
>>
>>    ISO/IEC 29100
>>    [ISO29100] is a freely accessible International Standard and its
>>    Privacy Principles are good to follow.
>>
>> What about the IETF privacy considerations for protocols, RFC6973, were
>> they also considered?  I think you are covering what's needed, but no
>> mention of it and favoring an ISO standard seems odd., using both is fine.
>>
>
> Good point. ISO/IEC 29100 is a high level document so the coverage is
> wider but does not get into concrete details where as RFC6973 gives more
> concrete guidance.  They complement each other. I have added a paragraph
> about RFC6873 in my personal copy.
>
> See: https://bitbucket.org/Nat/oauth-jwsreq/commits/9030e1be5cac
>
>
I think you've covered the important privacy considerations from 6973, so
the statement added on it should make that clear so the reader knows you've
done the work for them already.

Please let me know when the update has been posted.

Thank you,
Kathleen

>
>> Thank you.
>> --
>>
>> Best regards,
>> Kathleen
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> --
>
> Nat Sakimura
>
> Chairman of the Board, OpenID Foundation
>



-- 

Best regards,
Kathleen

--001a11451488aae6580544ba7037
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Nat,<div><br></div><div>Thank you for the updates.=C2=
=A0 Please let me know when you publish a new version.=C2=A0 I&#39;ll start=
 last call after the new year. =C2=A0inline.</div><div class=3D"gmail_extra=
"><br><div class=3D"gmail_quote">On Tue, Dec 27, 2016 at 7:57 PM, Nat Sakim=
ura <span dir=3D"ltr">&lt;<a href=3D"mailto:sakimura@gmail.com" target=3D"_=
blank">sakimura@gmail.com</a>&gt;</span> wrote:<br><blockquote class=3D"gma=
il_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-lef=
t:1ex"><div dir=3D"ltr">Hi<div><br></div><div>Sorry to have taken so long t=
o respond -- too much travel.=C2=A0</div></div></blockquote><div><br></div>=
<div>I hope you are able to rest a bit!</div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex"><div dir=3D"ltr"><div><br></div><div>My responses inline.=
=C2=A0</div><br><div class=3D"gmail_quote"><span class=3D""><div dir=3D"ltr=
">On Sat, Oct 29, 2016 at 12:39 AM Kathleen Moriarty &lt;<a href=3D"mailto:=
kathleen.moriarty.ietf@gmail.com" target=3D"_blank">kathleen.moriarty.ietf@=
gmail.<wbr>com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div =
dir=3D"ltr" class=3D"m_8335990636737575047gmail_msg">Hello,<div class=3D"m_=
8335990636737575047gmail_msg"><br class=3D"m_8335990636737575047gmail_msg">=
</div><div class=3D"m_8335990636737575047gmail_msg">I just reviewed draft-i=
etf-oauth-jwsreq, and it looks great and seems to be a nice addition to hel=
p with security.=C2=A0 Thanks for your work on it.</div><div class=3D"m_833=
5990636737575047gmail_msg"><br class=3D"m_8335990636737575047gmail_msg"></d=
iv><div class=3D"m_8335990636737575047gmail_msg">I only have a few comments=
.</div><div class=3D"m_8335990636737575047gmail_msg"><br class=3D"m_8335990=
636737575047gmail_msg"></div><div class=3D"m_8335990636737575047gmail_msg">=
The first is just about some wording that is awkward in the TLS section.</d=
iv><div class=3D"m_8335990636737575047gmail_msg"><br class=3D"m_83359906367=
37575047gmail_msg"></div><div class=3D"m_8335990636737575047gmail_msg">What=
&#39;s there now:</div><div class=3D"m_8335990636737575047gmail_msg"><pre s=
tyle=3D"box-sizing:border-box;overflow:auto;font-family:&#39;pt mono&#39;,m=
onaco,monospace;font-size:14px;padding:10px;margin-top:0px;margin-bottom:10=
.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;word-wrap:brea=
k-word;border:1px solid rgb(204,204,204);border-radius:4px;background-color=
:rgb(255,253,245)" class=3D"m_8335990636737575047gmail_msg">Client implemen=
tations supporting the Request Object URI method MUST
   support TLS as recommended in Recommendations for Secure Use of
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) [RFC7525].</pre><pre style=3D"box-sizing:border-box;overflow:auto=
;font-family:&#39;pt mono&#39;,monaco,monospace;font-size:14px;padding:10px=
;margin-top:0px;margin-bottom:10.5px;line-height:1.214;color:rgb(0,0,0);wor=
d-break:break-all;word-wrap:break-word;border:1px solid rgb(204,204,204);bo=
rder-radius:4px;background-color:rgb(255,253,245)" class=3D"m_8335990636737=
575047gmail_msg"><span style=3D"line-height:1.214" class=3D"m_8335990636737=
575047gmail_msg">How about:</span></pre><pre style=3D"box-sizing:border-box=
;overflow:auto;font-family:&#39;pt mono&#39;,monaco,monospace;font-size:14p=
x;padding:10px;margin-top:0px;margin-bottom:10.5px;line-height:1.214;color:=
rgb(0,0,0);word-break:break-all;word-wrap:break-word;border:1px solid rgb(2=
04,204,204);border-radius:4px;background-color:rgb(255,253,245)" class=3D"m=
_8335990636737575047gmail_msg"><pre style=3D"box-sizing:border-box;overflow=
:auto;font-family:&#39;pt mono&#39;,monaco,monospace;padding:10px;margin-to=
p:0px;margin-bottom:10.5px;line-height:1.214;word-break:break-all;word-wrap=
:break-word;border:1px solid rgb(204,204,204);border-radius:4px" class=3D"m=
_8335990636737575047gmail_msg">Client implementations supporting the Reques=
t Object URI method MUST
   support TLS following Recommendations for Secure Use of
   Transport Layer Security (TLS) and Datagram Transport Layer Security
   (DTLS) [RFC7525].</pre></pre><div class=3D"m_8335990636737575047gmail_ms=
g">Not a major change and just editorial, so take it or leave it.</div></di=
v></div></blockquote><div><br></div></span><div>Accepted as presented in my=
 personal copy.=C2=A0</div><div>See:=C2=A0<a href=3D"https://bitbucket.org/=
Nat/oauth-jwsreq/commits/0de915b22f13" target=3D"_blank">https://bitbucket.=
org/<wbr>Nat/oauth-jwsreq/commits/<wbr>0de915b22f13</a></div><span class=3D=
""><div>=C2=A0<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr" cla=
ss=3D"m_8335990636737575047gmail_msg"><div class=3D"m_8335990636737575047gm=
ail_msg"><div class=3D"m_8335990636737575047gmail_msg"><br class=3D"m_83359=
90636737575047gmail_msg"></div><div class=3D"m_8335990636737575047gmail_msg=
">2. In section 10, the introduction sentence leaves me wondering where the=
 additional attacks against OAuth 2.0 should also have a pointer in this se=
ntence:</div><div class=3D"m_8335990636737575047gmail_msg"><br class=3D"m_8=
335990636737575047gmail_msg"></div><div class=3D"m_8335990636737575047gmail=
_msg"><pre style=3D"box-sizing:border-box;overflow:auto;font-family:&#39;pt=
 mono&#39;,monaco,monospace;font-size:14px;padding:10px;margin-top:0px;marg=
in-bottom:10.5px;line-height:1.214;color:rgb(0,0,0);word-break:break-all;wo=
rd-wrap:break-word;border:1px solid rgb(204,204,204);border-radius:4px;back=
ground-color:rgb(255,253,245)" class=3D"m_8335990636737575047gmail_msg">   =
In addition to the all the security considerations discussed in OAuth
   2.0 [RFC6819], the following security considerations should be taken
   into account.</pre></div><div class=3D"m_8335990636737575047gmail_msg"><=
br class=3D"m_8335990636737575047gmail_msg"></div></div></div></blockquote>=
<div><br></div></span><div>An IETF document about them has not been adopted=
 yet. Shall I just add a sentence or two describing the threats that each s=
ub-sections are dealing with? Or shall I point to the research papers that =
I was reading? (Some of them are not freely available though.)=C2=A0</div><=
/div></div></blockquote><div><br></div><div>Any document that describes the=
m will likely be an &#39;updates&#39; to the OAuth spec, so we should be ok=
ay.=C2=A0 Is the WG likely to adopt a draft soon?=C2=A0 If so, we could wai=
t to start IETF last call.</div><div><br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1e=
x"><div dir=3D"ltr"><div class=3D"gmail_quote"><span class=3D""><div>=C2=A0=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-l=
eft:1px #ccc solid;padding-left:1ex"><div dir=3D"ltr" class=3D"m_8335990636=
737575047gmail_msg"><div class=3D"m_8335990636737575047gmail_msg"><div clas=
s=3D"m_8335990636737575047gmail_msg"></div><div class=3D"m_8335990636737575=
047gmail_msg">3. Nit: in first line of 10.4:</div><div class=3D"m_833599063=
6737575047gmail_msg"><pre style=3D"box-sizing:border-box;overflow:auto;font=
-family:&#39;pt mono&#39;,monaco,monospace;font-size:14px;padding:10px;marg=
in-top:0px;margin-bottom:10.5px;line-height:1.214;color:rgb(0,0,0);word-bre=
ak:break-all;word-wrap:break-word;border:1px solid rgb(204,204,204);border-=
radius:4px;background-color:rgb(255,253,245)" class=3D"m_833599063673757504=
7gmail_msg">Although this specification does not require them, researchs</p=
re></div><div class=3D"m_8335990636737575047gmail_msg">s/researchs/research=
ers/</div></div></div></blockquote><div><br></div></span><div>In fact, I me=
ant either &quot;research&quot; or &quot;researches&quot; as I was not poin=
ting to persons but rather the work done by them.=C2=A0</div><div>I fixed i=
t as &quot;research&quot; in my personal copy.=C2=A0</div><div>See:=C2=A0<a=
 href=3D"https://bitbucket.org/Nat/oauth-jwsreq/commits/0ec83d0c0c36" targe=
t=3D"_blank">https://bitbucket.org/<wbr>Nat/oauth-jwsreq/commits/<wbr>0ec83=
d0c0c36</a></div><span class=3D""><div><br></div><blockquote class=3D"gmail=
_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:=
1ex"><div dir=3D"ltr" class=3D"m_8335990636737575047gmail_msg"><div class=
=3D"m_8335990636737575047gmail_msg"><div class=3D"m_8335990636737575047gmai=
l_msg"><br class=3D"m_8335990636737575047gmail_msg"></div><div class=3D"m_8=
335990636737575047gmail_msg">4. I&#39;m sure you&#39;ll be asked about the =
following:</div><div class=3D"m_8335990636737575047gmail_msg"><pre style=3D=
"box-sizing:border-box;overflow:auto;font-family:&#39;pt mono&#39;,monaco,m=
onospace;font-size:14px;padding:10px;margin-top:0px;margin-bottom:10.5px;li=
ne-height:1.214;color:rgb(0,0,0);word-break:break-all;word-wrap:break-word;=
border:1px solid rgb(204,204,204);border-radius:4px;background-color:rgb(25=
5,253,245)" class=3D"m_8335990636737575047gmail_msg">   ISO/IEC 29100
   [ISO29100] is a freely accessible International Standard and its
   Privacy Principles are good to follow.</pre></div><div class=3D"m_833599=
0636737575047gmail_msg">What about the IETF privacy considerations for prot=
ocols, RFC6973, were they also considered?=C2=A0 I think you are covering w=
hat&#39;s needed, but no mention of it and favoring an ISO standard seems o=
dd., using both is fine.=C2=A0</div></div></div></blockquote><div><br></div=
></span><div>Good point. ISO/IEC 29100 is a high level document so the cove=
rage is wider but does not get into concrete details where as RFC6973 gives=
 more concrete guidance.=C2=A0 They complement each other. I have added a p=
aragraph about RFC6873 in my personal copy.=C2=A0</div><div><br></div><div>=
See:=C2=A0<a href=3D"https://bitbucket.org/Nat/oauth-jwsreq/commits/9030e1b=
e5cac" target=3D"_blank">https://bitbucket.org/<wbr>Nat/oauth-jwsreq/commit=
s/<wbr>9030e1be5cac</a></div><div><br></div></div></div></blockquote><div><=
br></div><div>I think you&#39;ve covered the important privacy consideratio=
ns from 6973, so the statement added on it should make that clear so the re=
ader knows you&#39;ve done the work for them already.</div><div><br></div><=
div>Please let me know when the update has been posted.</div><div><br></div=
><div>Thank you,</div><div>Kathleen=C2=A0</div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1e=
x"><div dir=3D"ltr"><div class=3D"gmail_quote"><div></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><span class=3D""><div dir=3D"ltr" class=3D"m_8335990636737575=
047gmail_msg"><div class=3D"m_8335990636737575047gmail_msg"><div class=3D"m=
_8335990636737575047gmail_msg"><br class=3D"m_8335990636737575047gmail_msg"=
></div><div class=3D"m_8335990636737575047gmail_msg">Thank you.</div>-- <br=
 class=3D"m_8335990636737575047gmail_msg"><div class=3D"m_83359906367375750=
47m_6248470965839308522gmail_signature m_8335990636737575047gmail_msg"><div=
 dir=3D"ltr" class=3D"m_8335990636737575047gmail_msg"><br class=3D"m_833599=
0636737575047gmail_msg"><div class=3D"m_8335990636737575047gmail_msg">Best =
regards,</div><div class=3D"m_8335990636737575047gmail_msg">Kathleen</div><=
/div></div>
</div></div></span>
______________________________<wbr>_________________<br class=3D"m_83359906=
36737575047gmail_msg">
OAuth mailing list<br class=3D"m_8335990636737575047gmail_msg">
<a href=3D"mailto:OAuth@ietf.org" class=3D"m_8335990636737575047gmail_msg" =
target=3D"_blank">OAuth@ietf.org</a><br class=3D"m_8335990636737575047gmail=
_msg">
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" rel=3D"noreferrer" =
class=3D"m_8335990636737575047gmail_msg" target=3D"_blank">https://www.ietf=
.org/mailman/<wbr>listinfo/oauth</a><span class=3D"HOEnZb"><font color=3D"#=
888888"><br class=3D"m_8335990636737575047gmail_msg">
</font></span></blockquote></div></div><span class=3D"HOEnZb"><font color=
=3D"#888888"><div dir=3D"ltr">-- <br></div><div data-smartmail=3D"gmail_sig=
nature"><p dir=3D"ltr">Nat Sakimura</p>
<p dir=3D"ltr">Chairman of the Board, OpenID Foundation</p>
</div>
</font></span></blockquote></div><br><br clear=3D"all"><div><br></div>-- <b=
r><div class=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div di=
r=3D"ltr"><br><div>Best regards,</div><div>Kathleen</div></div></div>
</div></div>

--001a11451488aae6580544ba7037--

