Skip to main content

Third-Party Token-Based Authentication and Authorization for Session Initiation Protocol (SIP)
draft-ietf-sipcore-sip-token-authnz-17

Yes

Murray Kucherawy

No Objection

Warren Kumari
(Alissa Cooper)
(Alvaro Retana)
(Deborah Brungard)
(Martin Vigoureux)
(Robert Wilton)

Note: This ballot was opened for revision 13 and is now closed.

Murray Kucherawy
Yes
Erik Kline
No Objection
Comment (2020-04-23 for -13) Not sent
[[ nits ]]

[ section 2.1.1 ]
* "(based on local policy)": Also possibly based on "local implementation
  status", or are all clients expected to support all the authentication
  schemes in this particular scenario?
Roman Danyliw
(was Discuss) No Objection
Comment (2020-05-05 for -15) Sent for earlier
Thank you for addressing my DISCUSS and COMMENT items.
Warren Kumari
No Objection
Éric Vyncke
No Objection
Comment (2020-04-23 for -13) Sent
hank you for the work put into this document. The document is clear, easy to read and quite useful even if examples would be welcome.

Please find below just two NITs.

I hope that this helps to improve the document,

Regards,

-éric

== NITS ==

-- section 1.3 --
Expanding "JWT" on first use will be improve readability. And, it is expanded in section 5 ;)

-- section 6 --
Probably better to write "This document has no IANA consideration; just to be clear."
Alissa Cooper Former IESG member
No Objection
No Objection (for -13) Not sent

                            
Alvaro Retana Former IESG member
No Objection
No Objection (for -13) Not sent

                            
Barry Leiba Former IESG member
(was Discuss) No Objection
No Objection (2020-04-21 for -13) Sent
Thanks for this document.  Enabling Open-ID and OAUTH with SIP is quite useful.

This document specifically calls out single sign-on as a reason to use this mechanism, and SSO has a host of serious security and privacy issues.  As those issues are not discussed in the referenced documents, I think they need to be raised here.  Recommended usage/configuration to avoid or mitigate the issues would be ideal, but at the very least I think they need to be documented, as it’s clear that implementors are not aware of them or don’t think they’re important enough to worry about.

Rifaat and I have discussed the above comment and have come up with some text for the Security Considerations that calls out some of the issues, briefly.  Something with more scope than that -- perhaps a BCP about security/privacy concerns with respect to SSO -- is in order, but, clearly, that's way out of scope for this document.

Other, editorial points.

— Section 1.1 —
Please copy the BCP 14 boilerplate exactly from RFC 8174.

— Section 1.3 —

   Refresh Tokens usualy are represented in a reference format

Typo: “usually”.

— Section 3 —

   The methods used and the access
   provided by the token is based on local policy

“are based”, to match the plural subject.

   Examples of such other
   mechanisms are introspection [RFC7662], user profile lookups, etc.

“Examples” and “etc.” are mutually redundant.  I would remove the latter and replace the comma before “user profile lookups” with “and”.

— Section 6 —
This can’t be empty.  It should say that there are no IANA actions needed for this document.
Benjamin Kaduk Former IESG member
(was Discuss) No Objection
No Objection (2020-05-05 for -16) Sent
Thank you for addressing my comments!
Deborah Brungard Former IESG member
No Objection
No Objection (for -13) Not sent

                            
Magnus Westerlund Former IESG member
(was Discuss) No Objection
No Objection (2020-04-23 for -13) Sent for earlier
An additional thing. 

Is SIP directly using the HTTP Authentication Schemes IANA registry (https://www.iana.org/assignments/http-authschemes/http-authschemes.xhtml#authschemes) or does it have its own tucked away somewhere? And if it is the former, should its references for the "bearer" add this RFC as a reference?
Martin Vigoureux Former IESG member
No Objection
No Objection (for -13) Not sent

                            
Robert Wilton Former IESG member
No Objection
No Objection (for -13) Not sent