
From stpeter@stpeter.im  Tue Jan  5 13:55:25 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 701D53A6407 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 13:55:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FuXmmfseLUFW for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 13:55:24 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 54AD63A6405 for <oauth@ietf.org>; Tue,  5 Jan 2010 13:55:24 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 9D43B40D03 for <oauth@ietf.org>; Tue,  5 Jan 2010 14:55:22 -0700 (MST)
Message-ID: <4B43B549.4040200@stpeter.im>
Date: Tue, 05 Jan 2010 14:55:21 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Thunderbird 2.0.0.23 (Macintosh/20090812)
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 0.96.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms040907020507040505080806"
Subject: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2010 21:55:25 -0000

This is a cryptographically signed message in MIME format.

--------------ms040907020507040505080806
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

<hats type='chair'/>

Happy New Year!

It's clear that the OAuth WG has a lot of work to do. To facilitate this
work, we propose to hold a series of interim conference calls (with
chatroom side channel) leading up to the face-to-face meeting at IETF 77
in March. The interim sessions will serve two main purposes:

1. More clearly define the problems we want to solve, including new
delegation use cases from the WRAP efforts.

2. Drive to consensus on solutions by gathering input from all WG
participants and quickly iterating on relevant Internet-Drafts.

IETF 77 will happen the week of March 22. That's 10+ weeks from now.
To make a lot of progress before then, the group will need to be focused
and disciplined. Therefore we propose to hold a 30-60 minute meeting
once a week, on Thursdays at 17:00 UTC ( = 9:00 PST / 18:00 CET etc.).
You could think of it as "OAuThursday". :)

Because of IETF reporting requirements, we'll need to announce each
meeting at least two weeks in advance, which means we could hold the
first meeting on January 21. If you have objections to this proposed
schedule, please post to the list in the next 24 hours. If there are no
strenuous objections, we will send out the first meeting notice 24 hours
from now to meet the IETF requirements. We realize that not everyone who
is interested will be able to attend each interim session, but we are
counting on the fact that enough people will attend each meeting so that
we can make strong progress.

More soon.

Peter Saint-Andre & Blaine Cook
co-chairs, OAuth WG


--------------ms040907020507040505080806
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms040907020507040505080806--

From rbarnes@bbn.com  Tue Jan  5 14:10:05 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0EADE3A6830 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 14:10:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7NIQ+O6czTmR for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 14:10:03 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 861253A659C for <oauth@ietf.org>; Tue,  5 Jan 2010 14:10:02 -0800 (PST)
Received: from [192.1.255.186] (helo=col-dhcp-192-1-255-186.bbn.com) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1NSHbE-0004eG-Bo; Tue, 05 Jan 2010 17:10:00 -0500
Message-Id: <F058C16D-AF5C-4B1F-A65D-45825BF1EBDE@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
In-Reply-To: <4B43B549.4040200@stpeter.im>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Tue, 5 Jan 2010 17:10:00 -0500
References: <4B43B549.4040200@stpeter.im>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2010 22:10:05 -0000

Sounds reasonable to me, although it does interrupt my Thursday lunch  
break, EST :)
--Richard


On Jan 5, 2010, at 4:55 PM, Peter Saint-Andre wrote:

> <hats type='chair'/>
>
> Happy New Year!
>
> It's clear that the OAuth WG has a lot of work to do. To facilitate  
> this
> work, we propose to hold a series of interim conference calls (with
> chatroom side channel) leading up to the face-to-face meeting at  
> IETF 77
> in March. The interim sessions will serve two main purposes:
>
> 1. More clearly define the problems we want to solve, including new
> delegation use cases from the WRAP efforts.
>
> 2. Drive to consensus on solutions by gathering input from all WG
> participants and quickly iterating on relevant Internet-Drafts.
>
> IETF 77 will happen the week of March 22. That's 10+ weeks from now.
> To make a lot of progress before then, the group will need to be  
> focused
> and disciplined. Therefore we propose to hold a 30-60 minute meeting
> once a week, on Thursdays at 17:00 UTC ( = 9:00 PST / 18:00 CET etc.).
> You could think of it as "OAuThursday". :)
>
> Because of IETF reporting requirements, we'll need to announce each
> meeting at least two weeks in advance, which means we could hold the
> first meeting on January 21. If you have objections to this proposed
> schedule, please post to the list in the next 24 hours. If there are  
> no
> strenuous objections, we will send out the first meeting notice 24  
> hours
> from now to meet the IETF requirements. We realize that not everyone  
> who
> is interested will be able to attend each interim session, but we are
> counting on the fact that enough people will attend each meeting so  
> that
> we can make strong progress.
>
> More soon.
>
> Peter Saint-Andre & Blaine Cook
> co-chairs, OAuth WG
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eve@xmlgrrl.com  Tue Jan  5 15:04:23 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BB89C3A68F3 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 15:04:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.708
X-Spam-Level: *
X-Spam-Status: No, score=1.708 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DX9tXNkRT-F9 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 15:04:22 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id A29383A6909 for <oauth@ietf.org>; Tue,  5 Jan 2010 15:04:22 -0800 (PST)
Received: from [192.168.168.185] (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o05N3xVa022488 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Tue, 5 Jan 2010 15:04:20 -0800
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <4B43B549.4040200@stpeter.im>
Date: Tue, 5 Jan 2010 15:03:59 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <6E330FB7-52C1-4FA9-9232-7E0E62D964F0@xmlgrrl.com>
References: <4B43B549.4040200@stpeter.im>
To: Peter Saint-Andre <stpeter@stpeter.im>
X-Mailer: Apple Mail (2.1077)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2010 23:04:23 -0000

Hi Peter and Blaine-- Though I know the hassle of trying to find an =
optimal time, I'm wondering if I can ask for a slight adjustment.  The =
User-Managed Access (UMA)[1] effort, whose core protocol spec[2] is =
realized as a profile directly on top of OAuth, has 90-minute weekly =
meetings that totally overlap your proposed time[3].  I know of at least =
two of us who would definitely want to attend the OAuth meeting series, =
and there are likely others[4].

(Unrelatedly, is it really possible that the OAuth meetings *wouldn't* =
stretch to 60 minutes every time? :-)

Thanks for your consideration.

	Eve

[1] http://kantarainitiative.org/confluence/display/uma/Home
[2] =
http://kantarainitiative.org/confluence/display/uma/UMA+1.0+Core+Protocol
[3] =
http://kantarainitiative.org/confluence/display/uma/Meetings+and+Minutes
[4] =
http://kantarainitiative.org/confluence/display/uma/Participant+Roster


On 5 Jan 2010, at 1:55 PM, Peter Saint-Andre wrote:

> <hats type=3D'chair'/>
>=20
> Happy New Year!
>=20
> It's clear that the OAuth WG has a lot of work to do. To facilitate =
this
> work, we propose to hold a series of interim conference calls (with
> chatroom side channel) leading up to the face-to-face meeting at IETF =
77
> in March. The interim sessions will serve two main purposes:
>=20
> 1. More clearly define the problems we want to solve, including new
> delegation use cases from the WRAP efforts.
>=20
> 2. Drive to consensus on solutions by gathering input from all WG
> participants and quickly iterating on relevant Internet-Drafts.
>=20
> IETF 77 will happen the week of March 22. That's 10+ weeks from now.
> To make a lot of progress before then, the group will need to be =
focused
> and disciplined. Therefore we propose to hold a 30-60 minute meeting
> once a week, on Thursdays at 17:00 UTC ( =3D 9:00 PST / 18:00 CET =
etc.).
> You could think of it as "OAuThursday". :)
>=20
> Because of IETF reporting requirements, we'll need to announce each
> meeting at least two weeks in advance, which means we could hold the
> first meeting on January 21. If you have objections to this proposed
> schedule, please post to the list in the next 24 hours. If there are =
no
> strenuous objections, we will send out the first meeting notice 24 =
hours
> from now to meet the IETF requirements. We realize that not everyone =
who
> is interested will be able to attend each interim session, but we are
> counting on the fact that enough people will attend each meeting so =
that
> we can make strong progress.
>=20
> More soon.
>=20
> Peter Saint-Andre & Blaine Cook
> co-chairs, OAuth WG
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog


From stpeter@stpeter.im  Tue Jan  5 16:06:00 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E02C3A68CB for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 16:06:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IOoTy+HgCrbg for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 16:05:59 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 605A93A65A6 for <oauth@ietf.org>; Tue,  5 Jan 2010 16:05:59 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id C5AC440D03; Tue,  5 Jan 2010 17:05:57 -0700 (MST)
Message-ID: <4B43D3E4.6070300@stpeter.im>
Date: Tue, 05 Jan 2010 17:05:56 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Thunderbird 2.0.0.23 (Macintosh/20090812)
MIME-Version: 1.0
To: Eve Maler <eve@xmlgrrl.com>
References: <4B43B549.4040200@stpeter.im> <6E330FB7-52C1-4FA9-9232-7E0E62D964F0@xmlgrrl.com>
In-Reply-To: <6E330FB7-52C1-4FA9-9232-7E0E62D964F0@xmlgrrl.com>
X-Enigmail-Version: 0.96.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms020502060708090309090000"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 00:06:00 -0000

This is a cryptographically signed message in MIME format.

--------------ms020502060708090309090000
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

On 1/5/10 4:03 PM, Eve Maler wrote:
> Hi Peter and Blaine-- Though I know the hassle of trying to find an
> optimal time, I'm wondering if I can ask for a slight adjustment.
> The User-Managed Access (UMA)[1] effort, whose core protocol spec[2]
> is realized as a profile directly on top of OAuth, has 90-minute
> weekly meetings that totally overlap your proposed time[3].  I know
> of at least two of us who would definitely want to attend the OAuth
> meeting series, and there are likely others[4].

I'm not wedded to that time, I just wanted to propose *something*. Would
you prefer earlier, later, or a different day?

> (Unrelatedly, is it really possible that the OAuth meetings
> *wouldn't* stretch to 60 minutes every time? :-)

That depends on how dictatorial the chairs are. You'd be surprised.

/psa


--------------ms020502060708090309090000
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms020502060708090309090000--

From eve@xmlgrrl.com  Tue Jan  5 16:39:09 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C1A7A3A688B for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 16:39:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.708
X-Spam-Level: *
X-Spam-Status: No, score=1.708 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n1AB+ejrBtYh for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 16:39:08 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id CD34C3A657C for <oauth@ietf.org>; Tue,  5 Jan 2010 16:39:08 -0800 (PST)
Received: from [192.168.168.185] ([192.168.168.185]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o060ckvl023614 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Tue, 5 Jan 2010 16:39:07 -0800
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <4B43D3E4.6070300@stpeter.im>
Date: Tue, 5 Jan 2010 16:38:46 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <DB2DDF95-8BB5-4424-B9F6-DF374E37535B@xmlgrrl.com>
References: <4B43B549.4040200@stpeter.im> <6E330FB7-52C1-4FA9-9232-7E0E62D964F0@xmlgrrl.com> <4B43D3E4.6070300@stpeter.im>
To: Peter Saint-Andre <stpeter@stpeter.im>
X-Mailer: Apple Mail (2.1077)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 00:39:10 -0000

On 5 Jan 2010, at 4:05 PM, Peter Saint-Andre wrote:
> I'm not wedded to that time, I just wanted to propose *something*. =
Would
> you prefer earlier, later, or a different day?

An hour (or more) earlier, or an hour and a half (or more) later, would =
be ideal from my perspective -- thanks for being willing to consider a =
change like this.

>=20
>> (Unrelatedly, is it really possible that the OAuth meetings
>> *wouldn't* stretch to 60 minutes every time? :-)
>=20
> That depends on how dictatorial the chairs are. You'd be surprised.

Aha -- I have faith in you. ;)

	Eve

Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog


From email@pbryan.net  Tue Jan  5 16:54:00 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 915F03A67FF for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 16:54:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.304
X-Spam-Level: 
X-Spam-Status: No, score=-0.304 tagged_above=-999 required=5 tests=[BAYES_05=-1.11, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nqfSAY9Cv2S4 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 16:53:59 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id CDFC03A62C1 for <oauth@ietf.org>; Tue,  5 Jan 2010 16:53:59 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id 4B3D86420 for <oauth@ietf.org>; Wed,  6 Jan 2010 00:53:58 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <DB2DDF95-8BB5-4424-B9F6-DF374E37535B@xmlgrrl.com>
References: <4B43B549.4040200@stpeter.im> <6E330FB7-52C1-4FA9-9232-7E0E62D964F0@xmlgrrl.com> <4B43D3E4.6070300@stpeter.im> <DB2DDF95-8BB5-4424-B9F6-DF374E37535B@xmlgrrl.com>
Content-Type: text/plain; charset="UTF-8"
Date: Tue, 05 Jan 2010 16:53:50 -0800
Message-ID: <1262739230.3176.32.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 00:54:00 -0000

FWIW, I'm in the same boat as Eve: in the UMA calls and definitely
interested in participating in the OAuth calls.

Paul

On Tue, 2010-01-05 at 16:38 -0800, Eve Maler wrote:
> On 5 Jan 2010, at 4:05 PM, Peter Saint-Andre wrote:
> > I'm not wedded to that time, I just wanted to propose *something*. Would
> > you prefer earlier, later, or a different day?
> 
> An hour (or more) earlier, or an hour and a half (or more) later, would be ideal from my perspective -- thanks for being willing to consider a change like this.
> 
> > 
> >> (Unrelatedly, is it really possible that the OAuth meetings
> >> *wouldn't* stretch to 60 minutes every time? :-)
> > 
> > That depends on how dictatorial the chairs are. You'd be surprised.
> 
> Aha -- I have faith in you. ;)
> 
> 	Eve
> 
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From Dick.Hardt@microsoft.com  Tue Jan  5 19:08:49 2010
Return-Path: <Dick.Hardt@microsoft.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0EC0A3A67B2 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 19:08:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.599
X-Spam-Level: 
X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FqQ6exmTl1Oz for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 19:08:48 -0800 (PST)
Received: from smtp.microsoft.com (mailc.microsoft.com [131.107.115.214]) by core3.amsl.com (Postfix) with ESMTP id 4EA263A67A3 for <oauth@ietf.org>; Tue,  5 Jan 2010 19:08:48 -0800 (PST)
Received: from TK5EX14HUBC103.redmond.corp.microsoft.com (157.54.86.9) by TK5-EXGWY-E803.partners.extranet.microsoft.com (10.251.56.169) with Microsoft SMTP Server (TLS) id 8.2.176.0; Tue, 5 Jan 2010 19:09:26 -0800
Received: from TK5EX14MBXC101.redmond.corp.microsoft.com ([169.254.1.226]) by TK5EX14HUBC103.redmond.corp.microsoft.com ([157.54.86.9]) with mapi; Tue, 5 Jan 2010 19:08:47 -0800
From: Dick Hardt <Dick.Hardt@microsoft.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Thread-Topic: [OAUTH-WG] 2010 kickoff
Thread-Index: AQHKjlIq35PQ++YQQkWfpmAXXOAgJZGIZJWA
Date: Wed, 6 Jan 2010 03:08:45 +0000
Message-ID: <39C317BE-A032-487F-A7E9-CF26CF7E1C18@microsoft.com>
References: <4B43B549.4040200@stpeter.im>
In-Reply-To: <4B43B549.4040200@stpeter.im>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="us-ascii"
Content-ID: <573277cd-66f0-43a4-bc9c-9d49c1550694>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 03:08:49 -0000

On 2010-01-05, at 1:55 PM, Peter Saint-Andre wrote:

> Therefore we propose to hold a 30-60 minute meeting
> once a week, on Thursdays at 17:00 UTC ( =3D 9:00 PST / 18:00 CET etc.).
> You could think of it as "OAuThursday". :)

How about 18:00 UTC?

After lunch EST. Not too early PST. Avoids most overlap with UMA.

btw: implicit +1 to weekly call

-- Dick

From stpeter@stpeter.im  Tue Jan  5 19:19:59 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6C67B3A6782 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 19:19:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FYk8Lq5MVdY6 for <oauth@core3.amsl.com>; Tue,  5 Jan 2010 19:19:58 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 3CADF3A62C1 for <oauth@ietf.org>; Tue,  5 Jan 2010 19:19:58 -0800 (PST)
Received: from squire.local (ip-216-17-182-146.rev.frii.com [216.17.182.146]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 6AE6840D03; Tue,  5 Jan 2010 20:19:56 -0700 (MST)
Message-ID: <4B44015A.3040407@stpeter.im>
Date: Tue, 05 Jan 2010 20:19:54 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Thunderbird 2.0.0.23 (Macintosh/20090812)
MIME-Version: 1.0
To: Dick Hardt <Dick.Hardt@microsoft.com>
References: <4B43B549.4040200@stpeter.im> <39C317BE-A032-487F-A7E9-CF26CF7E1C18@microsoft.com>
In-Reply-To: <39C317BE-A032-487F-A7E9-CF26CF7E1C18@microsoft.com>
X-Enigmail-Version: 0.96.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms060903020306050603040008"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 03:19:59 -0000

This is a cryptographically signed message in MIME format.

--------------ms060903020306050603040008
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

<hat type='chair'/>

On 1/5/10 8:08 PM, Dick Hardt wrote:
> On 2010-01-05, at 1:55 PM, Peter Saint-Andre wrote:
> 
>> Therefore we propose to hold a 30-60 minute meeting
>> once a week, on Thursdays at 17:00 UTC ( = 9:00 PST / 18:00 CET etc.).
>> You could think of it as "OAuThursday". :)
> 
> How about 18:00 UTC?
> 
> After lunch EST. Not too early PST. Avoids most overlap with UMA.

The UMA schedule considers Pacific Time to be canonical (oh how
parochial! :) but 09:00-10:30 Pacific is currently UTC-08:00 which means
that their meeting runs until 18:30 UTC. We could do 19:00 UTC but that
is 20:00 for most folks in Europe. Blaine said that anything until 01:00
UTC would work for him, so perhaps we can try 19:00 UTC on January 21st
and change it after that if it causes problems.

And despite the cutesy name I'm not attached to OAuThursday, so Monday,
Tuesday, or Wednesday would work fine as well. (I think Friday is out
because our friends in Europe presumably have something better to do on
Friday evenings than to talk about authorization technologies....)

> btw: implicit +1 to weekly call

Great.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



--------------ms060903020306050603040008
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms060903020306050603040008--

From danbri@danbri.org  Wed Jan  6 00:05:17 2010
Return-Path: <danbri@danbri.org>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E8F183A67FC for <oauth@core3.amsl.com>; Wed,  6 Jan 2010 00:05:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JHCZah-WvrZh for <oauth@core3.amsl.com>; Wed,  6 Jan 2010 00:05:17 -0800 (PST)
Received: from mail-ew0-f214.google.com (mail-ew0-f214.google.com [209.85.219.214]) by core3.amsl.com (Postfix) with ESMTP id E7B683A680C for <oauth@ietf.org>; Wed,  6 Jan 2010 00:05:16 -0800 (PST)
Received: by ewy6 with SMTP id 6so16172817ewy.29 for <oauth@ietf.org>; Wed, 06 Jan 2010 00:05:12 -0800 (PST)
MIME-Version: 1.0
Received: by 10.216.87.14 with SMTP id x14mr1791411wee.127.1262765112054; Wed,  06 Jan 2010 00:05:12 -0800 (PST)
In-Reply-To: <4B44015A.3040407@stpeter.im>
References: <4B43B549.4040200@stpeter.im> <39C317BE-A032-487F-A7E9-CF26CF7E1C18@microsoft.com> <4B44015A.3040407@stpeter.im>
Date: Wed, 6 Jan 2010 09:05:12 +0100
Message-ID: <eb19f3361001060005q77770e69xd3449a7869bcd2ac@mail.gmail.com>
From: Dan Brickley <danbri@danbri.org>
To: Peter Saint-Andre <stpeter@stpeter.im>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 08:05:18 -0000

On Wed, Jan 6, 2010 at 4:19 AM, Peter Saint-Andre <stpeter@stpeter.im> wrote:
> <hat type='chair'/>

> And despite the cutesy name I'm not attached to OAuThursday, so Monday,
> Tuesday, or Wednesday would work fine as well. (I think Friday is out
> because our friends in Europe presumably have something better to do on
> Friday evenings than to talk about authorization technologies....)

You'd be suprised ;) but thanks for bearing this in mind...

>> btw: implicit +1 to weekly call

I wasn't expecting telecons from an IETF group, but yes, this sounds
useful. At least at this stage. I hope to participate somehow...

Dan

From James.H.Manger@team.telstra.com  Wed Jan  6 03:54:04 2010
Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3D04428B23E for <oauth@core3.amsl.com>; Wed,  6 Jan 2010 03:54:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level: 
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cnqiUUGuMHw5 for <oauth@core3.amsl.com>; Wed,  6 Jan 2010 03:54:03 -0800 (PST)
Received: from mailipao.vtcif.telstra.com.au (mailipao.vtcif.telstra.com.au [202.12.144.27]) by core3.amsl.com (Postfix) with ESMTP id 2BC4D3A68D2 for <oauth@ietf.org>; Wed,  6 Jan 2010 03:54:02 -0800 (PST)
Received: from maili.vtcif.telstra.com.au (HELO mailai.vtcif.telstra.com.au) ([202.12.142.17]) by mailipai.vtcif.telstra.com.au with ESMTP; 06 Jan 2010 16:31:01 +1100
Received: from mail.cdn.telstra.com.au (localhost [127.0.0.1]) by mailai.vtcif.telstra.com.au (Postfix) with ESMTP id F39DF1DAA1 for <oauth@ietf.org>; Wed,  6 Jan 2010 16:30:57 +1100 (EST)
Received: from WSMSG3703.srv.dir.telstra.com (wsmsg3703.srv.dir.telstra.com [172.49.40.171]) by mail.cdn.telstra.com.au (8.8.2/8.6.9) with ESMTP id QAA24893 for <oauth@ietf.org>; Wed, 6 Jan 2010 16:30:57 +1100 (EST)
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by WSMSG3703.srv.dir.telstra.com ([172.49.40.171]) with mapi; Wed, 6 Jan 2010 16:30:57 +1100
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 6 Jan 2010 16:30:49 +1100
Thread-Topic: [OAUTH-WG] 2010 kickoff
Thread-Index: AcqOkWvUumY+cVdfTTejllS8KFCeAg==
Message-ID: <255B9BB34FB7D647A506DC292726F6E1124DF4B114@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US, en-AU
Content-Language: en-AU
acceptlanguage: en-US, en-AU
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] 2010 kickoff
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jan 2010 11:54:04 -0000
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From zachary.zeltsan@alcatel-lucent.com  Wed Jan  6 16:46:23 2010
Return-Path: <zachary.zeltsan@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C52733A6944 for <oauth@core3.amsl.com>; Wed,  6 Jan 2010 16:46:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1aZfWyHbdBGd for <oauth@core3.amsl.com>; Wed,  6 Jan 2010 16:46:23 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id E485D3A683D for <oauth@ietf.org>; Wed,  6 Jan 2010 16:46:22 -0800 (PST)
Received: from ihrh1.emsr.lucent.com (h135-1-218-53.lucent.com [135.1.218.53]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id o070kKwr027794 for <oauth@ietf.org>; Wed, 6 Jan 2010 18:46:21 -0600 (CST)
Received: from USNAVSXCHHUB03.ndc.alcatel-lucent.com (usnavsxchhub03.ndc.alcatel-lucent.com [135.3.39.112]) by ihrh1.emsr.lucent.com (8.13.8/emsr) with ESMTP id o070kKFr009458 for <oauth@ietf.org>; Wed, 6 Jan 2010 18:46:20 -0600 (CST)
Received: from USNAVSXCHMBSA3.ndc.alcatel-lucent.com ([135.3.39.119]) by USNAVSXCHHUB03.ndc.alcatel-lucent.com ([135.3.39.112]) with mapi; Wed, 6 Jan 2010 18:46:20 -0600
From: "Zeltsan, Zachary (Zachary)" <zachary.zeltsan@alcatel-lucent.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Wed, 6 Jan 2010 18:46:18 -0600
Thread-Topic: Questions regarding OAuth
Thread-Index: AcqPMtLZszzGZkHAR02IcErdWZc6bw==
Message-ID: <5710F82C0E73B04FA559560098BF95B124EED7E257@USNAVSXCHMBSA3.ndc.alcatel-lucent.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_5710F82C0E73B04FA559560098BF95B124EED7E257USNAVSXCHMBSA_"
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Subject: [OAUTH-WG] Questions regarding OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2010 00:46:23 -0000

--_000_5710F82C0E73B04FA559560098BF95B124EED7E257USNAVSXCHMBSA_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


I am trying to get a better understanding of Oauth and need answers to the =
following questions:

* Why is there a need for a token secret given that there is a client secre=
t?
* How is the token secret protected when is transmitted from Server to Clie=
nt as part of the temporary credentials?
* Why is there a need for temporary credentials?

Could you please help with the answers?

With thanks and best wishes for the New Year,

Zachary Zeltsan




--_000_5710F82C0E73B04FA559560098BF95B124EED7E257USNAVSXCHMBSA_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from rtf -->
<style><!-- .EmailQuote { margin-left: 1pt; padding-left: 4pt; border-left:=
 #800000 2px solid; } --></style>
</head>
<body>
<font face=3D"Arial, sans-serif" size=3D"3">
<div>&nbsp;</div>
<div><font size=3D"2">I am trying to get a better understanding of Oauth an=
d need answers to the following questions:</font></div>
<div><font size=3D"2">&nbsp;</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">* Why is there a need=
 for a token secret given that there is a client secret? </font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">* How is the token se=
cret protected when is transmitted from Server to Client as part of the tem=
porary credentials? </font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">* Why is there a need=
 for temporary credentials?</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&nbsp;</font></div>
<div><font size=3D"2">Could you please help with the answers?</font></div>
<div><font size=3D"2">&nbsp;</font></div>
<div><font size=3D"2">With thanks and best wishes for the New Year,</font><=
/div>
<div><font size=3D"2">&nbsp;</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">Zachary Zeltsan</font=
></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&nbsp;</font></div>
<div><font face=3D"Courier New, monospace" size=3D"2">&nbsp;</font></div>
<div><font size=3D"2">&nbsp;</font></div>
</font>
</body>
</html>

--_000_5710F82C0E73B04FA559560098BF95B124EED7E257USNAVSXCHMBSA_--

From stpeter@stpeter.im  Thu Jan  7 13:01:32 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 06A2E28C163; Thu,  7 Jan 2010 13:01:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LIgBgpQE4P-u; Thu,  7 Jan 2010 13:01:31 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 10F1328C120; Thu,  7 Jan 2010 13:01:31 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 0E23040D10; Thu,  7 Jan 2010 14:01:28 -0700 (MST)
Message-ID: <4B464BA7.7040308@stpeter.im>
Date: Thu, 07 Jan 2010 14:01:27 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Thunderbird 2.0.0.23 (Macintosh/20090812)
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 0.96.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=sha1; boundary="------------ms080302060109040709020501"
Cc: IESG Secretary <iesg-secretary@ietf.org>
Subject: [OAUTH-WG] OAuth interim meeting, 2010-01-21
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2010 21:01:32 -0000

This is a cryptographically signed message in MIME format.

--------------ms080302060109040709020501
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit

<hat type='chair'/>

The OAuth WG will hold an interim meeting on January 21, 2010, at 19:00
UTC for 60 minutes, via conference call (WebEx) and the WG's chatroom.
This is the first of what we expect will be a series of meetings leading
up to IETF 77, but at this time we are scheduling only the first session
so that we can work out various logistical issues. Call-in details to
follow from the Secretariat, and agenda to follow from the Chairs.

Peter

-- 
Peter Saint-Andre
https://stpeter.im/



--------------ms080302060109040709020501
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms080302060109040709020501--

From root@core3.amsl.com  Thu Jan  7 14:00:02 2010
Return-Path: <root@core3.amsl.com>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 0) id 262FF3A689F; Thu,  7 Jan 2010 14:00:01 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: ietf-announce@ietf.org
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0
Message-Id: <20100107220002.262FF3A689F@core3.amsl.com>
Date: Thu,  7 Jan 2010 14:00:02 -0800 (PST)
Cc: oauth@ietf.org
Subject: [OAUTH-WG] OAuth WG Virtual Interim Meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2010 22:00:02 -0000

The OAuth WG will hold a virtual interim meeting on January 21, 2010, 
at 19:00 UTC for 60 minutes, via conference call (WebEx) and the WG's 
chatroom. This is the first of what we expect will be a series of 
meetings leading up to IETF 77, but at this time we are scheduling only 
the first session so that we can work out various logistical issues. 
Call-in details and agenda to follow on the OAuth mailing list 
(http://www.ietf.org/mail-archive/web/oauth/current/maillist.html).

From recordond@gmail.com  Fri Jan  8 15:44:46 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 71E643A6407 for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 15:44:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.739
X-Spam-Level: 
X-Spam-Status: No, score=-0.739 tagged_above=-999 required=5 tests=[BAYES_20=-0.74, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WiB-XFMnWAJm for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 15:44:45 -0800 (PST)
Received: from mail-iw0-f195.google.com (mail-iw0-f195.google.com [209.85.223.195]) by core3.amsl.com (Postfix) with ESMTP id 9359E3A6405 for <oauth@ietf.org>; Fri,  8 Jan 2010 15:44:45 -0800 (PST)
Received: by iwn33 with SMTP id 33so5960025iwn.29 for <oauth@ietf.org>; Fri, 08 Jan 2010 15:44:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:date:message-id:subject :from:to:content-type; bh=8rX7TVL3feR5PyOW/UgjCR+98jV2qt5RxX6B1PoNbjQ=; b=h7r5ikoCtGH9wBDgOg8uSIQ/6kD+01q5T0Lhdw1jK6Hq/bLjqf9LoaZaP9h88j5tzT CGfas2uoJwCC3NIOiR8HlgZXc5C3Rzj0jJnadJ1w9snP+Tigi5ixUD1pPimnXEUe/7wF LrCRjINStUkRQLSg/Kq2DcM5tkOmmjlaHijw4=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=d80Bkl6eUN5QbojjVuEooTQ+cmaQ4/s4q27JGIhwFm4KWdzYTv/X/kj9qsU5E5jYlM y+WsyGKDkBIcIyXOXDvYplvUF/J1nT6nEUU7PtZdwryEeSuG8A5Ih2i3KZQXNJ0kLOt7 3Np7p6M6rgl3gUKqOuk19QRWNnJeC60HQjZ7I=
MIME-Version: 1.0
Received: by 10.231.40.216 with SMTP id l24mr2088178ibe.40.1262994280968; Fri,  08 Jan 2010 15:44:40 -0800 (PST)
Date: Fri, 8 Jan 2010 15:44:40 -0800
Message-ID: <fd6741651001081544w1d4563a6y3d5caa3753225c4b@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: oauth@googlegroups.com, OAuth WG <oauth@ietf.org>, oauth-wrap-wg@googlegroups.com
Content-Type: multipart/alternative; boundary=001517741146787210047cafc5fa
Subject: [OAUTH-WG] Talking about what's up with OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jan 2010 23:44:46 -0000

--001517741146787210047cafc5fa
Content-Type: text/plain; charset=ISO-8859-1

Sorry for emailing across a few lists, but this morning Chris Messina, Dick
Hardt, and I wrote a post on O'Reilly Radar talking about the successes of
OAuth 1.0a, the introduction of WRAP, and where we think there is consensus
to build OAuth 2.0.  I might be biased, but it's worth a read. ;)

http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html

--David

--001517741146787210047cafc5fa
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Sorry for emailing=A0across=A0a few lists, but this morning Chris Messina, =
Dick Hardt, and I wrote a post on O&#39;Reilly Radar talking about the succ=
esses of OAuth 1.0a, the introduction of WRAP, and where we think there is =
consensus to build OAuth 2.0. =A0I might be biased, but it&#39;s worth a re=
ad. ;)<div>
<br></div><div><a href=3D"http://radar.oreilly.com/2010/01/whats-going-on-w=
ith-oauth.html">http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.=
html</a></div><div><br></div><div>--David</div>

--001517741146787210047cafc5fa--

From recordond@gmail.com  Fri Jan  8 16:35:19 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E344C3A68C9 for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 16:35:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mgPIxDTHRYPK for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 16:35:19 -0800 (PST)
Received: from mail-px0-f186.google.com (mail-px0-f186.google.com [209.85.216.186]) by core3.amsl.com (Postfix) with ESMTP id 1B0283A68C5 for <oauth@ietf.org>; Fri,  8 Jan 2010 16:35:19 -0800 (PST)
Received: by pxi16 with SMTP id 16so5435632pxi.29 for <oauth@ietf.org>; Fri, 08 Jan 2010 16:35:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:references:message-id:from:to :in-reply-to:content-type:content-transfer-encoding:x-mailer :mime-version:subject:date:cc; bh=uWWrWQfkQGLr0/xANdDRkWcY0I9inJ5xkdekITMRgHE=; b=oCZ2Z2MbLBJEosVXbWfhAkUcaaIqpV71yHnIQFkZ9ckg7B/BpSeiVcC/l/KDsLZ/LH 3RFQElVBpU64FguXhlkKG9lI2kXDP64zH3e4bul0QyqYB1njfUzHK+vkTcH0tAZuSCgp VTrin6dOxYwI1DFRr92Z3nt4S6Ffy/iMlGQVs=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=references:message-id:from:to:in-reply-to:content-type :content-transfer-encoding:x-mailer:mime-version:subject:date:cc; b=qj0cdMqGXx6YBhzOPsg/Nj2tmZhiBowruDfoaasYBvmJIt7cCJVW+z/8swNwSIPftd otHD3QqykmZ9BQYMIFsXlyGuwELcBzyjvXNLS/+JEYgRgYuo2dPu73R5f3hb9jxH22nj kkT8oB0tZyrJ5UyoM9dzZcQZQISg0EFAoP7AI=
Received: by 10.143.26.40 with SMTP id d40mr2190413wfj.232.1262997309107; Fri, 08 Jan 2010 16:35:09 -0800 (PST)
Received: from ?10.44.133.87? ([166.205.138.111]) by mx.google.com with ESMTPS id 21sm19064169pzk.11.2010.01.08.16.35.07 (version=TLSv1/SSLv3 cipher=RC4-MD5); Fri, 08 Jan 2010 16:35:08 -0800 (PST)
References: <fd6741651001081544w1d4563a6y3d5caa3753225c4b@mail.gmail.com>
Message-Id: <B69CBCF7-C646-4101-8E1A-DCC9D941CFF5@gmail.com>
From: David Recordon <recordond@gmail.com>
To: David Recordon <recordond@gmail.com>
In-Reply-To: <fd6741651001081544w1d4563a6y3d5caa3753225c4b@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-2--925218611
Content-Transfer-Encoding: 7bit
X-Mailer: iPhone Mail (7D11)
Mime-Version: 1.0 (iPhone Mail 7D11)
Date: Fri, 8 Jan 2010 16:35:04 -0800
Cc: "oauth@googlegroups.com" <oauth@googlegroups.com>, OAuth WG <oauth@ietf.org>, "oauth-wrap-wg@googlegroups.com" <oauth-wrap-wg@googlegroups.com>
Subject: Re: [OAUTH-WG] Talking about what's up with OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 00:35:20 -0000

--Apple-Mail-2--925218611
Content-Type: text/plain;
	charset=us-ascii;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit

I forgot to mention Eran as well, he helped to write it as well! :)

--
Sent from my iPhone

On Jan 8, 2010, at 3:44 PM, David Recordon <recordond@gmail.com> wrote:

> Sorry for emailing across a few lists, but this morning Chris  
> Messina, Dick Hardt, and I wrote a post on O'Reilly Radar talking  
> about the successes of OAuth 1.0a, the introduction of WRAP, and  
> where we think there is consensus to build OAuth 2.0.  I might be  
> biased, but it's worth a read. ;)
>
> http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html
>
> --David

--Apple-Mail-2--925218611
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: 7bit

<html><body bgcolor="#FFFFFF"><div>I forgot to mention Eran as well, he helped to write it as well! :)<br><br><div>--</div>Sent from my iPhone</div><div><br>On Jan 8, 2010, at 3:44 PM, David Recordon &lt;<a href="mailto:recordond@gmail.com">recordond@gmail.com</a>&gt; wrote:<br><br></div><div></div><blockquote type="cite"><div>Sorry for emailing&nbsp;across&nbsp;a few lists, but this morning Chris Messina, Dick Hardt, and I wrote a post on O'Reilly Radar talking about the successes of OAuth 1.0a, the introduction of WRAP, and where we think there is consensus to build OAuth 2.0. &nbsp;I might be biased, but it's worth a read. ;)<div>
<br></div><div><a href="http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html"><a href="http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html">http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html</a></a></div><div><br></div><div>--David</div>
</div></blockquote></body></html>
--Apple-Mail-2--925218611--

From eran@hueniverse.com  Fri Jan  8 18:15:13 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BC3F23A6830 for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 18:15:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m3K3HkeYAm2n for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 18:15:12 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id BC31C3A659C for <oauth@ietf.org>; Fri,  8 Jan 2010 18:15:12 -0800 (PST)
Received: (qmail 16345 invoked from network); 9 Jan 2010 02:15:08 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 9 Jan 2010 02:15:07 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 8 Jan 2010 19:15:07 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>, "oauth@googlegroups.com" <oauth@googlegroups.com>
Date: Fri, 8 Jan 2010 19:15:21 -0700
Thread-Topic: OAuth 1.0 PLAINTEXT without SSL/TLS
Thread-Index: AcqQ0Zhc5Ipm+e5/S5Sab0hJ0rIhkg==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-cr-hashedpuzzle: AQk1 AYkq AtlO B0no HXCm Java KGWU LQ5r LsFb NnxH NqJI O9A5 PSUj QCmE R0w9 XLdi; 2; bwBhAHUAdABoAEAAZwBvAG8AZwBsAGUAZwByAG8AdQBwAHMALgBjAG8AbQA7AG8AYQB1AHQAaABAAGkAZQB0AGYALgBvAHIAZwA=; Sosha1_v1; 7; {72DC72FE-6FAF-48AF-A9AB-C99F1E6591F9}; ZQByAGEAbgBAAGgAdQBlAG4AaQB2AGUAcgBzAGUALgBjAG8AbQA=; Sat, 09 Jan 2010 02:15:21 GMT; TwBBAHUAdABoACAAMQAuADAAIABQAEwAQQBJAE4AVABFAFgAVAAgAHcAaQB0AGgAbwB1AHQAIABTAFMATAAvAFQATABTAA==
x-cr-puzzleid: {72DC72FE-6FAF-48AF-A9AB-C99F1E6591F9}
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 02:15:13 -0000

I no longer think there is a valid reason why the OAuth 1.0 specification d=
oes not mandate using a secure channel with PLAINTEXT, and I would like to =
make this change from SHOULD to MUST in the RFC draft [1].

Is there anyone using OAuth PLAINTEXT *not* over TLS/SSL? Is there a *good*=
 reason why the 1.0 specification should not mandate using a secure channel=
 for PLAINTEXT? If someone really wants to use it without, it's a free coun=
try but I can't think of any reason.

The only reason not to make the change is if there are existing deployed us=
e cases where PLAINTEXT is used in such a way. If there are none after two =
years, we should not allow it moving forward.

EHL

[1] http://tools.ietf.org/html/draft-hammer-oauth

From faynberg@alcatel-lucent.com  Fri Jan  8 18:44:47 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CF5E228C0E4 for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 18:44:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2J3LuDh70Afi for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 18:44:47 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id 08DF928C0EB for <oauth@ietf.org>; Fri,  8 Jan 2010 18:44:43 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id o092iaXx012641 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 8 Jan 2010 20:44:36 -0600 (CST)
Received: from [135.244.37.103] (faynberg.lra.lucent.com [135.244.37.103]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o092iZ4F027891; Fri, 8 Jan 2010 20:44:35 -0600 (CST)
Message-ID: <4B47ED93.1080801@alcatel-lucent.com>
Date: Fri, 08 Jan 2010 21:44:35 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Cc: "oauth@googlegroups.com" <oauth@googlegroups.com>, "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 02:44:47 -0000

I fully support this. I think Zachary has been questioning that 
"should," too, in his recent post.

Furthermore, even if there are implementations that are not using TLS 
(or SSL), I would look at it as an implementation--not 
specification--problem. The specification must not have known security 
holes.

Igor

Eran Hammer-Lahav wrote:
> I no longer think there is a valid reason why the OAuth 1.0 specification does not mandate using a secure channel with PLAINTEXT, and I would like to make this change from SHOULD to MUST in the RFC draft [1].
>
> Is there anyone using OAuth PLAINTEXT *not* over TLS/SSL? Is there a *good* reason why the 1.0 specification should not mandate using a secure channel for PLAINTEXT? If someone really wants to use it without, it's a free country but I can't think of any reason.
>
> The only reason not to make the change is if there are existing deployed use cases where PLAINTEXT is used in such a way. If there are none after two years, we should not allow it moving forward.
>
> EHL
>
> [1] http://tools.ietf.org/html/draft-hammer-oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   


From john@jkemp.net  Sat Jan  9 04:43:02 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 07A9C3A6808 for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 04:43:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level: 
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id czV11rvvjC9z for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 04:43:01 -0800 (PST)
Received: from outbound-mail-105.bluehost.com (outbound-mail-105.bluehost.com [69.89.18.5]) by core3.amsl.com (Postfix) with SMTP id 0384B3A67EB for <oauth@ietf.org>; Sat,  9 Jan 2010 04:43:00 -0800 (PST)
Received: (qmail 22641 invoked by uid 0); 9 Jan 2010 12:42:58 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy3.bluehost.com with SMTP; 9 Jan 2010 12:42:58 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=oY/N+T/r68pU9ZR4XO2uXnw0BCaTypz2sbsxEDAT1jmaHHMV2rs6N7qI/E+Swigv0bHQnCy4RCOvhtKs2IZgPY16v7bFv0zLXgonDhwMJn9WM3Lw23y8FDHjlfWW17Ou;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NTaeg-0002tI-9E; Sat, 09 Jan 2010 05:42:58 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sat, 9 Jan 2010 07:42:57 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net>
References: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: oauth@googlegroups.com
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] [oauth] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 12:43:02 -0000

On Jan 8, 2010, at 9:15 PM, Eran Hammer-Lahav wrote:

[...]

>  Is there a *good* reason why the 1.0 specification should not mandate =
using a secure channel for PLAINTEXT?=20

I guess the question is whether you want implementations using other =
methods to ensure confidentiality and which don't need other security =
properties (servers on an intranet, for example, firewalled/VPN'd from =
the general Internet) to become non-conforming?

> The only reason not to make the change is if there are existing =
deployed use cases where PLAINTEXT is used in such a way.

I would imagine that there are deployments of OAuth in environments =
where they simply want to use PLAINTEXT for authorization, and have =
existing methods of dealing with other security properties.=20

What is the actual reasoning behind this change? I don't understand why =
we would suddenly now decide to make some whole class of implementations =
non-conforming, even if there were only few deployments?

Regards,

- johnk=

From romeda@gmail.com  Sat Jan  9 05:17:38 2010
Return-Path: <romeda@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 75BB43A67E9 for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 05:17:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g9aZ3x0kv3hC for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 05:17:37 -0800 (PST)
Received: from mail-fx0-f215.google.com (mail-fx0-f215.google.com [209.85.220.215]) by core3.amsl.com (Postfix) with ESMTP id 79BA73A67B1 for <oauth@ietf.org>; Sat,  9 Jan 2010 05:17:37 -0800 (PST)
Received: by fxm7 with SMTP id 7so18451566fxm.29 for <oauth@ietf.org>; Sat, 09 Jan 2010 05:17:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:cc:content-type; bh=tZ6vbcnTP7vGA9yRxQ8QcDzWoDLfnFXkGX0gs7WrGvg=; b=xePKjlpT10SXcLWPXYUZJ5Gqgg3P8EwpdN4U4sWDKcDz2Vz5c065ByRCyy7Fngd9Zs UW1kp+R1K/F1Xt06gV/K5ABKGthC1+YWoO9OjEtZHPx7ebotduS2DcrIWgj94XJYbil4 2Q3N0aKnOZR8yxzaeQppKcgaFEEZeUlTTwaWM=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=A6P7pahPS0v4u1lAsfQuXv1ouGr9GKBM8Dw4HFRiwVZQYzbcey0I1vAFt1ifb2sQCp qAqJ9Hsa8Gw6o5acAF6bNBLEP63BtKUbz/sNzRiVLGScczDAXyqPM2HIP7/9FwVG6Guf 7FCW53BY+Mfl8OHcyGMaFccVDtaM0+XElb4rY=
MIME-Version: 1.0
Received: by 10.103.84.27 with SMTP id m27mr6451377mul.19.1263043052102; Sat,  09 Jan 2010 05:17:32 -0800 (PST)
In-Reply-To: <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net>
References: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net>
From: Blaine Cook <romeda@gmail.com>
Date: Sat, 9 Jan 2010 13:17:12 +0000
Message-ID: <d37b4b431001090517w5ad6523dye4e1dc185ada0937@mail.gmail.com>
To: oauth@googlegroups.com
Content-Type: text/plain; charset=UTF-8
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] [oauth] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 13:17:38 -0000

2010/1/9 John Kemp <john@jkemp.net>:
> On Jan 8, 2010, at 9:15 PM, Eran Hammer-Lahav wrote:
>
> What is the actual reasoning behind this change? I don't understand why we would suddenly now decide to make some whole class of implementations non-conforming, even if there were only few deployments?

Eran did ask if anyone was using OAuth PLAINTEXT without SSL; that
said, I don't think that it matters if anyone is using PLAINTEXT with
SSL; the spec should outline the basis for interop, and
implementations that want to be interoperable and secure MUST check to
see that SSL is being used for PLAINTEXT (especially server
implementations).

Implementations are always free (as in free country) to have special
flags that disable the security checks and put their OAuth
implementation into non-spec-compliant mode. The same sort of
principle applies to TLS client implementations; the certificate chain
MUST be checked as per the specification, but many clients allow
developers just issue warnings or provide flags to turn off the
warnings that the certificate chain checks are not being performed.
Even though silenced warnings that your TLS connections are insecure
is bad, it's better than the authors of TLS libraries not having to
consider those warnings at all.

b.

From eran@hueniverse.com  Sat Jan  9 09:12:06 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 693ED3A6858 for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 09:12:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zTYpYIskbCMk for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 09:12:05 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 0BF993A67FE for <oauth@ietf.org>; Sat,  9 Jan 2010 09:12:04 -0800 (PST)
Received: (qmail 14624 invoked from network); 9 Jan 2010 17:12:02 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 9 Jan 2010 17:12:02 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Sat, 9 Jan 2010 10:12:02 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: John Kemp <john@jkemp.net>, "oauth@googlegroups.com" <oauth@googlegroups.com>
Date: Sat, 9 Jan 2010 10:12:22 -0700
Thread-Topic: [OAUTH-WG] [oauth] OAuth 1.0 PLAINTEXT without SSL/TLS
Thread-Index: AcqRKUjeS8oWaD0yQ7yb53I9oukqXgAI6MVw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E72343787F341B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net>
In-Reply-To: <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] [oauth] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 17:12:06 -0000

Hi John,

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of John Kemp
> Sent: Saturday, January 09, 2010 4:43 AM

> What is the actual reasoning behind this change? I don't understand why w=
e
> would suddenly now decide to make some whole class of implementations
> non-conforming, even if there were only few deployments?

I have come to the conclusion that arguments against requiring a secure cha=
nnel during some portions of the protocols are irrelevant. We have been mak=
ing the case that some environments will not be able to deploy OAuth if SSL=
/TLS is requires, but we should put that claim under the same practical scr=
utiny as other requirements we consider. I did a quick survey of existing i=
mplementations and every single one uses HTTPS for obtaining tokens and for=
 PLAINTEXT requests.

If someone if going to write internal implementations, they are free to cha=
nge the protocol as they see fit. In such cases interop is more influenced =
by the internal nature of the system than the specification. But I can't co=
me up with a single reason why we should allow, by making it a SHOULD, to i=
mplement OAuth in such an obviously insecure way (in an IETF RFC).

My argument is that there is little practical difference between sending to=
ken secrets in the clear to not validating signatures. Once you open the do=
or for someone to steal secrets, nothing else matters.

My proposed language would be along the lines of "MUST use a secure channel=
 such as TLS/SSL or another mechanism providing the same protections". This=
 allows not using TLS/SSL when the environment provides the same protection=
s some other way.

EHL


From jpanzer@google.com  Sat Jan  9 10:31:04 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4BBCC3A67FE for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 10:31:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6c+GqSLk+Dst for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 10:31:03 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id ECB623A677C for <oauth@ietf.org>; Sat,  9 Jan 2010 10:31:02 -0800 (PST)
Received: from kpbe17.cbf.corp.google.com (kpbe17.cbf.corp.google.com [172.25.105.81]) by smtp-out.google.com with ESMTP id o09IUwQG025607 for <oauth@ietf.org>; Sat, 9 Jan 2010 18:30:59 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263061859; bh=UPOV+uq1dz2ePjAfI/4BGnNJPjY=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=RCBpxsuLFpqeMOKBxeHxfQt2wQWUqzPbhQjjIJVGmRVBbupJR5n9qDD9RBVK9/VO8 jq3SwkO7lFhhlJa6hkQDQ==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:content-transfer-encoding:x-system-of-record; b=kLID7ML3BJn/lsa7kq5p6csymcG0KLNOvBl0/5REZne2EZnQsC4M4mnf4k9CCXRqg PDBKW/zvISnObNZju6tag==
Received: from pwj2 (pwj2.prod.google.com [10.241.219.66]) by kpbe17.cbf.corp.google.com with ESMTP id o09IUvV2027435 for <oauth@ietf.org>; Sat, 9 Jan 2010 10:30:57 -0800
Received: by pwj2 with SMTP id 2so643463pwj.34 for <oauth@ietf.org>; Sat, 09 Jan 2010 10:30:56 -0800 (PST)
MIME-Version: 1.0
Received: by 10.114.54.12 with SMTP id c12mr3932368waa.81.1263061856670; Sat,  09 Jan 2010 10:30:56 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72343787F341B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net> <90C41DD21FB7C64BB94121FBBC2E72343787F341B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sat, 9 Jan 2010 10:30:56 -0800
Message-ID: <cb5f7a381001091030q7498b2d3l6db6f263be13ca9a@mail.gmail.com>
From: John Panzer <jpanzer@google.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: "oauth@googlegroups.com" <oauth@googlegroups.com>, "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 18:31:04 -0000

On Saturday, January 9, 2010, Eran Hammer-Lahav <eran@hueniverse.com> wrote=
:
> Hi John,
>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
>> Of John Kemp
>> Sent: Saturday, January 09, 2010 4:43 AM
>
>> What is the actual reasoning behind this change? I don't understand why =
we
>> would suddenly now decide to make some whole class of implementations
>> non-conforming, even if there were only few deployments?
>
> I have come to the conclusion that arguments against requiring a secure c=
hannel during some portions of the protocols are irrelevant. We have been m=
aking the case that some environments will not be able to deploy OAuth if S=
SL/TLS is requires, but we should put that claim under the same practical s=
crutiny as other requirements we consider. I did a quick survey of existing=
 implementations and every single one uses HTTPS for obtaining tokens and f=
or PLAINTEXT requests.
>
> If someone if going to write internal implementations, they are free to c=
hange the protocol as they see fit. In such cases interop is more influence=
d by the internal nature of the system than the specification. But I can't =
come up with a single reason why we should allow, by making it a SHOULD, to=
 implement OAuth in such an obviously insecure way (in an IETF RFC).
>
> My argument is that there is little practical difference between sending =
token secrets in the clear to not validating signatures. Once you open the =
door for someone to steal secrets, nothing else matters.
>
> My proposed language would be along the lines of "MUST use a secure chann=
el such as TLS/SSL or another mechanism providing the same protections". Th=
is allows not using TLS/SSL when the environment provides the same protecti=
ons some other way.
>

(Such as a vpn for example.) +1.
> EHL
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--=20
--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer

From john@jkemp.net  Sat Jan  9 17:46:53 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 82E6F3A67FA for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 17:46:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level: 
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 06rHgu-CdaJz for <oauth@core3.amsl.com>; Sat,  9 Jan 2010 17:46:52 -0800 (PST)
Received: from outbound-mail-08.bluehost.com (outbound-mail-08.bluehost.com [69.89.17.208]) by core3.amsl.com (Postfix) with SMTP id 7FF573A6407 for <oauth@ietf.org>; Sat,  9 Jan 2010 17:46:52 -0800 (PST)
Received: (qmail 26996 invoked by uid 0); 10 Jan 2010 01:46:50 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy1.bluehost.com with SMTP; 10 Jan 2010 01:46:50 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=JWnPhPvDUE+Gt4N/PWCdrszcqGorIs/gatZDRACtfpX3MGDl/OGxCxy95G2ALQyNniz+PjH1IKH88bEseSl+cSHUpjK7EG97xTDPwtjOt+ubDx1rJElL5Pu/EmvYJ0BS;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NTmtF-0001Lw-PX; Sat, 09 Jan 2010 18:46:50 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E72343787F341B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Sat, 9 Jan 2010 20:46:48 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <965D3864-CA25-4097-9383-C839897378F9@jkemp.net>
References: <90C41DD21FB7C64BB94121FBBC2E72343787F3416B@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F33FD294-1FC0-400C-86A7-EA684D0DEF66@jkemp.net> <90C41DD21FB7C64BB94121FBBC2E72343787F341B9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
To: oauth@googlegroups.com
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] [oauth] OAuth 1.0 PLAINTEXT without SSL/TLS
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Jan 2010 01:46:53 -0000

Hey Eran!

On Jan 9, 2010, at 12:12 PM, Eran Hammer-Lahav wrote:

[...] (sure, agreed)

> My proposed language would be along the lines of "MUST use a secure =
channel such as TLS/SSL or another mechanism providing the same =
protections". This allows not using TLS/SSL when the environment =
provides the same protections some other way.

Your wording looks good to me.

Cheers,

- johnk

>=20
> EHL
>=20
> --=20
> You received this message because you are subscribed to the Google =
Groups "OAuth" group.
> To post to this group, send email to oauth@googlegroups.com.
> To unsubscribe from this group, send email to =
oauth+unsubscribe@googlegroups.com.
> For more options, visit this group at =
http://groups.google.com/group/oauth?hl=3Den.
>=20
>=20


From john@johnpanzer.com  Fri Jan  8 18:07:27 2010
Return-Path: <john@johnpanzer.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 91BBE3A691A for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 18:07:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.598
X-Spam-Level: 
X-Spam-Status: No, score=-102.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8EJuWw+2H9LQ for <oauth@core3.amsl.com>; Fri,  8 Jan 2010 18:07:26 -0800 (PST)
Received: from mail-yx0-f174.google.com (mail-yx0-f174.google.com [209.85.210.174]) by core3.amsl.com (Postfix) with ESMTP id A20E13A6830 for <oauth@ietf.org>; Fri,  8 Jan 2010 18:07:23 -0800 (PST)
Received: by yxe4 with SMTP id 4so18521862yxe.32 for <oauth@ietf.org>; Fri, 08 Jan 2010 18:07:18 -0800 (PST)
Received: by 10.150.164.18 with SMTP id m18mr30269ybe.87.1263002838274; Fri, 08 Jan 2010 18:07:18 -0800 (PST)
Received: from ?192.168.1.100? (adsl-70-231-245-29.dsl.snfc21.sbcglobal.net [70.231.245.29]) by mx.google.com with ESMTPS id 9sm8193177ywe.41.2010.01.08.18.07.16 (version=TLSv1/SSLv3 cipher=RC4-MD5); Fri, 08 Jan 2010 18:07:16 -0800 (PST)
Sender: John Panzer <john@johnpanzer.com>
Message-ID: <4B47E4D4.1020501@acm.org>
Date: Fri, 08 Jan 2010 18:07:16 -0800
From: John Panzer <jpanzer@acm.org>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: oauth@googlegroups.com
References: <fd6741651001081544w1d4563a6y3d5caa3753225c4b@mail.gmail.com>
In-Reply-To: <fd6741651001081544w1d4563a6y3d5caa3753225c4b@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------070100010804060509000702"
X-Mailman-Approved-At: Sun, 10 Jan 2010 18:18:00 -0800
Cc: OAuth WG <oauth@ietf.org>, oauth-wrap-wg@googlegroups.com
Subject: Re: [OAUTH-WG] [oauth] Talking about what's up with OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: jpanzer@acm.org
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Jan 2010 02:07:27 -0000

This is a multi-part message in MIME format.
--------------070100010804060509000702
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

This is a great summary from Chris, Eran, Dick, and David.  Thanks guys!

David Recordon wrote:
> Sorry for emailing across a few lists, but this morning Chris Messina, 
> Dick Hardt, and I wrote a post on O'Reilly Radar talking about the 
> successes of OAuth 1.0a, the introduction of WRAP, and where we think 
> there is consensus to build OAuth 2.0.  I might be biased, but it's 
> worth a read. ;)
>
> http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html
>
> --David
>
> ------------------------------------------------------------------------
>
> -- 
> You received this message because you are subscribed to the Google 
> Groups "OAuth" group.
> To post to this group, send email to oauth@googlegroups.com.
> To unsubscribe from this group, send email to 
> oauth+unsubscribe@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/oauth?hl=en.


--------------070100010804060509000702
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
This is a great summary from Chris, Eran, Dick, and David.&nbsp; Thanks guys!<br>
<br>
David Recordon wrote:
<blockquote
 cite="mid:fd6741651001081544w1d4563a6y3d5caa3753225c4b@mail.gmail.com"
 type="cite">Sorry for emailing&nbsp;across&nbsp;a few lists, but this morning
Chris Messina, Dick Hardt, and I wrote a post on O'Reilly Radar talking
about the successes of OAuth 1.0a, the introduction of WRAP, and where
we think there is consensus to build OAuth 2.0. &nbsp;I might be biased, but
it's worth a read. ;)
  <div><br>
  </div>
  <div><a moz-do-not-send="true"
 href="http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html">http://radar.oreilly.com/2010/01/whats-going-on-with-oauth.html</a></div>
  <div><br>
  </div>
  <div>--David</div>
  <br>
  <hr size="4" width="90%"><br>
-- <br>
You received this message because you are subscribed to the Google
Groups "OAuth" group.<br>
To post to this group, send email to <a class="moz-txt-link-abbreviated" href="mailto:oauth@googlegroups.com">oauth@googlegroups.com</a>.<br>
To unsubscribe from this group, send email to
<a class="moz-txt-link-abbreviated" href="mailto:oauth+unsubscribe@googlegroups.com">oauth+unsubscribe@googlegroups.com</a>.<br>
For more options, visit this group at
<a class="moz-txt-link-freetext" href="http://groups.google.com/group/oauth?hl=en">http://groups.google.com/group/oauth?hl=en</a>.<br>
</blockquote>
<br>
</body>
</html>

--------------070100010804060509000702--

From eran@hueniverse.com  Wed Jan 13 16:53:46 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1B1123A67F5 for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 16:53:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.392
X-Spam-Level: 
X-Spam-Status: No, score=-1.392 tagged_above=-999 required=5 tests=[AWL=-1.207, BAYES_40=-0.185]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Z4X3Q1Nwhb4 for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 16:53:45 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 194C53A682E for <oauth@ietf.org>; Wed, 13 Jan 2010 16:53:45 -0800 (PST)
Received: (qmail 3602 invoked from network); 14 Jan 2010 00:53:42 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 14 Jan 2010 00:53:41 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 13 Jan 2010 17:53:41 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 13 Jan 2010 17:53:39 -0700
Thread-Topic: Setting Course
Thread-Index: AcqUtAJ5nis0ujudxEKkwnxDgZdO7Q==
Message-ID: <C773AB13.2D05A%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] Setting Course
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 00:53:46 -0000

I think the goal of the next two months is to produce two semi-stable draft=
s
covering the two parts of the protocol:

1. Authentication - how to make authenticated requests / signed messages
using token credentials. This will be based on my token auth draft [1] as a
starting point. There are a few open issues to decide based on feedback
received from Panzer and Eaton which I will post about shortly.

2. Authorization - how to obtain a set of token credentials using web
redirection and other flows introduced by WRAP. This will be a new draft
using the web-delegation draft [2] skeleton and the flows in WRAP section 5
[3]. There are many open issues to decide, starting with which flows to
keep, which to move to an extension, and if there are additional ones to
add.

These drafts will be locked before the WG meeting to allow review and will
be discussed at the meeting. We will also discuss any charter changes
required to accommodate the drafts. This approach will allow us to focus on
the work and worry about the charter at the meeting. This will ensure we
ground the process in actual technical consensus.

Comments?

EHL

[1] http://tools.ietf.org/html/draft-hammer-http-token-auth
[2] http://tools.ietf.org/html/draft-ietf-oauth-web-delegation
[3] http://bit.ly/oauth-wrap


From stpeter@stpeter.im  Wed Jan 13 18:17:51 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D869C3A6839 for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 18:17:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dfBa3sWfcJdb for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 18:17:50 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 35F723A67E9 for <oauth@ietf.org>; Wed, 13 Jan 2010 18:17:50 -0800 (PST)
Received: from squire.local (dsl-175-253.dynamic-dsl.frii.net [216.17.175.253]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id C05D940D1C for <oauth@ietf.org>; Wed, 13 Jan 2010 19:17:46 -0700 (MST)
Message-ID: <4B4E7ECA.30803@stpeter.im>
Date: Wed, 13 Jan 2010 19:17:46 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: oauth@ietf.org
References: <C773AB13.2D05A%eran@hueniverse.com>
In-Reply-To: <C773AB13.2D05A%eran@hueniverse.com>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms090008000001000104040501"
Subject: Re: [OAUTH-WG] Setting Course
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 02:17:52 -0000

This is a cryptographically signed message in MIME format.

--------------ms090008000001000104040501
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<hat type=3D'chair'/>

On 1/13/10 5:53 PM, Eran Hammer-Lahav wrote:
> I think the goal of the next two months is to produce two semi-stable d=
rafts
> covering the two parts of the protocol:
>=20
> 1. Authentication - how to make authenticated requests / signed message=
s
> using token credentials. This will be based on my token auth draft [1] =
as a
> starting point. There are a few open issues to decide based on feedback=

> received from Panzer and Eaton which I will post about shortly.
>=20
> 2. Authorization - how to obtain a set of token credentials using web
> redirection and other flows introduced by WRAP. This will be a new draf=
t
> using the web-delegation draft [2] skeleton and the flows in WRAP secti=
on 5
> [3]. There are many open issues to decide, starting with which flows to=

> keep, which to move to an extension, and if there are additional ones t=
o
> add.
>=20
> These drafts will be locked before the WG meeting to allow review and w=
ill
> be discussed at the meeting. We will also discuss any charter changes
> required to accommodate the drafts. This approach will allow us to focu=
s on
> the work and worry about the charter at the meeting. This will ensure w=
e
> ground the process in actual technical consensus.

That approach sounds quite reasonable. Two comments:

a. In my opinion the scenarios are not limited to what has been
introduced by the WRAP discussions, and I have been encouraging folks to
submit I-Ds that document additional scenarios as input to our
understanding of the problem space (the WRAP authors will submit their
work soon, as well).

b. Once we have a clear grasp of the problem space, we'll be able to
make longer-lasting progress on solutions. As you have outlined, at a
high level the solutions are how to make authenticated requests and how
to obtain credentials for making such requests, but it seems to me that
there's still quite a bit of work to be done in figuring out what's
"core" to those solutions and what needs to go in various extensions.

Blaine and I will send out a rough agenda tomorrow for our first
conference call on the 21st.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms090008000001000104040501
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms090008000001000104040501--

From eran@hueniverse.com  Wed Jan 13 21:41:02 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 990343A67E3 for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 21:41:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.197
X-Spam-Level: 
X-Spam-Status: No, score=-2.197 tagged_above=-999 required=5 tests=[AWL=0.402,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bZGMGc8suWjh for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 21:41:01 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 8109F3A67A2 for <oauth@ietf.org>; Wed, 13 Jan 2010 21:41:01 -0800 (PST)
Received: (qmail 5385 invoked from network); 14 Jan 2010 05:40:58 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 14 Jan 2010 05:40:58 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 13 Jan 2010 22:40:58 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 13 Jan 2010 22:40:55 -0700
Thread-Topic: Request Signing vs. API Signing vs. Message Signing
Thread-Index: AcqU3CPuwCqeIdaGREGtBH68H2236w==
Message-ID: <C773EE67.2D076%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 05:41:02 -0000

Authentication Open Question #1: What to sign?

OAuth Core 1.0 was designed to sign API requests made using common
form-encoded formats. The main component of the 1.0 signature base string
are the parameters. The host and HTTP methods are important but were never
the focus on the signed content.

draft-hammer-oauth does not change the process but does describe the proces=
s
very differently, changing the focus form signing API requests and
parameters to signing HTTP requests (partially).
draft-hammer-http-token-auth takes this approach a step further and focuses
on signing the raw HTTP request components, completely ignoring their
meaning as used by API calls. The end result is very similar but the
differences are important.

Brian Eaton proposed [1] an alternative approach to sign messages instead o=
f
API calls or HTTP request. In his proposal, the HTTP request (or API call
based on your perspective) in transformed into a message (in his case using
a JSON-based format) which is then signed. This additional layer of
abstraction allows the use of the method with other transports or use cases
in which parameters are not sent in the request URI or body.

QUESTION: Do you prefer:

A. Directly processing the HTTP request into a base string for signing
(draft-hammer-oauth style).
B. Treating the request as an API call with form-encoded parameters (OAuth
1.0 style).
C. Converting the request into a normalized message and signing that (Eaton
style).

EHL

[1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html


From eran@hueniverse.com  Wed Jan 13 21:51:40 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A493B3A67C0 for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 21:51:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.297
X-Spam-Level: 
X-Spam-Status: No, score=-2.297 tagged_above=-999 required=5 tests=[AWL=0.302,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y1YcIgIeqUVr for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 21:51:39 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id D45EC3A6774 for <oauth@ietf.org>; Wed, 13 Jan 2010 21:51:39 -0800 (PST)
Received: (qmail 14489 invoked from network); 14 Jan 2010 05:51:37 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 14 Jan 2010 05:51:37 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Wed, 13 Jan 2010 22:51:37 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 13 Jan 2010 22:51:34 -0700
Thread-Topic: Include Normalized Request with Raw Request
Thread-Index: AcqU3aDNRQDuBUgzok2piVXruUYylg==
Message-ID: <C773F0E6.2D079%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] Include Normalized Request with Raw Request
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 05:51:40 -0000

Authentication Open Question #2: Should the normalized request be included
with the request?

In OAuth 1.0 the request is normalized into the signature base string by th=
e
client and the server. The base string itself is never sent with the
request. Brian Eaton proposed [1] to include the signed string with the
request, removing the need for the server to regenerate the normalized
string, as well as allowing the client to use the included string to send
additional (signed) information that is not part of the HTTP request.

This is a significant departure from OAuth 1.0, but one that does call for
an in-depth discussion.

Some advantages to this approach are:

- the server can easily verify what is being signed
- the client can include additional parameters in the signed message
- the request remains valid even if changed by proxies or other
intermediaries

Some disadvantages are:

- the request is sent twice, once raw and once normalized
- it adds another place to make mistakes and create security holes if the
server uses the raw data without fully comparing it to the normalized
(signed) data
- since any server enforcing security will only use the data contained in
the normalized portion, it will create a de-facto standard for API requests
(not nearly as heavy as SOAP or WS-*) in which case the request itself is
normalized before sending.

QUESTIONS: How do people feel about this? What are some other advantaged an=
d
disadvantages of this approach?


EHL

[1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html


From eran@hueniverse.com  Wed Jan 13 22:05:38 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CC3413A68EB for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:05:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.358
X-Spam-Level: 
X-Spam-Status: No, score=-2.358 tagged_above=-999 required=5 tests=[AWL=0.241,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VItJDlU464pZ for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:05:37 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id C2F463A67C0 for <oauth@ietf.org>; Wed, 13 Jan 2010 22:05:37 -0800 (PST)
Received: (qmail 16304 invoked from network); 14 Jan 2010 06:05:35 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 14 Jan 2010 06:05:35 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 13 Jan 2010 23:05:35 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 13 Jan 2010 23:05:33 -0700
Thread-Topic: Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqU35Tio7i1nAveE0qAPbWJT1POPA==
Message-ID: <C773F42D.2D07C%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 06:05:38 -0000

Authentication Open Question #3: Should require using TLS/SSL/secure channe=
l
for any request made without a signature?

WRAP got a lot of attention (mostly negative) to how it sends requests
without using signatures or a secure channel. WRAP only uses HTTPS for
obtaining tokens but does not mandate (or even suggests) using HTTPS for
making protected resources requests. Instead, WRAP recommends short lived
tokens that must be refreshed (using HTTPS).

In a recent thread [1] on this list we reach (very small) consensus that th=
e
OAuth 1.0 protocol should mandate HTTPS for the PLAINTEXT method. The
community edition only recommends it.

QUESTIONS: Are there any valid (such that will pass IETF security review
scrutiny) reasons for allowing unsigned requests to be sent in the clear
over an insecure channel? Are there use cases for this (regardless of their
security properties)?

EHL

[1] http://www.ietf.org/mail-archive/web/oauth/current/msg00951.html


From eran@hueniverse.com  Wed Jan 13 22:12:37 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 67A3F3A689D for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:12:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.398
X-Spam-Level: 
X-Spam-Status: No, score=-2.398 tagged_above=-999 required=5 tests=[AWL=0.201,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NSRrDob5MZUK for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:12:33 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id CD55D3A68F7 for <oauth@ietf.org>; Wed, 13 Jan 2010 22:12:32 -0800 (PST)
Received: (qmail 32180 invoked from network); 14 Jan 2010 06:12:30 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 14 Jan 2010 06:12:30 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 13 Jan 2010 23:12:29 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Peter Saint-Andre <stpeter@stpeter.im>, OAuth WG <oauth@ietf.org>
Date: Wed, 13 Jan 2010 23:12:27 -0700
Thread-Topic: [OAUTH-WG] Setting Course
Thread-Index: AcqUv8fKHeIrb0+ISPCjL5qivB7QVwAIMPdW
Message-ID: <C773F5CB.2D080%eran@hueniverse.com>
In-Reply-To: <4B4E7ECA.30803@stpeter.im>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Setting Course
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 06:12:38 -0000

On 1/13/10 6:17 PM, "Peter Saint-Andre" <stpeter@stpeter.im> wrote:

>> These drafts will be locked before the WG meeting to allow review and wi=
ll
>> be discussed at the meeting. We will also discuss any charter changes
>> required to accommodate the drafts. This approach will allow us to focus=
 on
>> the work and worry about the charter at the meeting. This will ensure we
>> ground the process in actual technical consensus.
>=20
> That approach sounds quite reasonable. Two comments:
>=20
> a. In my opinion the scenarios are not limited to what has been
> introduced by the WRAP discussions, and I have been encouraging folks to
> submit I-Ds that document additional scenarios as input to our
> understanding of the problem space (the WRAP authors will submit their
> work soon, as well).

Exactly. That's why I asked if there are additional ones to add. But I thin=
k
it is important the people will read the WRAP scenarios before spending tim=
e
in writing new I-Ds to see if their *use-case* is already covered. If it is=
,
but is not solved to their satisfaction, I think that should be posted as
feedback to the WRAP proposal and not as yet another I-D.

> b. Once we have a clear grasp of the problem space, we'll be able to
> make longer-lasting progress on solutions. As you have outlined, at a
> high level the solutions are how to make authenticated requests and how
> to obtain credentials for making such requests, but it seems to me that
> there's still quite a bit of work to be done in figuring out what's
> "core" to those solutions and what needs to go in various extensions.

This is true for the authorization part, but I don't think it is true for
the authentication part. On the authentication side I think we are very
close to a proposal. I have followed up with a few open questions and will
send more over the next few days.

I think we can get the authentication part mostly done quickly, and then pu=
t
it aside to focus on the authorization, going back to make changes as
limitations or issues are found based on the authorization experience.

> Blaine and I will send out a rough agenda tomorrow for our first
> conference call on the 21st.

Great. I will not be able to attend but hopefully others will and report
back with new ideas and feedback.

EHL


From jpanzer@google.com  Wed Jan 13 22:30:49 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2DD843A690A for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:30:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.977
X-Spam-Level: 
X-Spam-Status: No, score=-105.977 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xRLC-M9XvDFn for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:30:48 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id A312E3A68FE for <oauth@ietf.org>; Wed, 13 Jan 2010 22:30:47 -0800 (PST)
Received: from kpbe18.cbf.corp.google.com (kpbe18.cbf.corp.google.com [172.25.105.82]) by smtp-out.google.com with ESMTP id o0E6Ug91020796 for <oauth@ietf.org>; Thu, 14 Jan 2010 06:30:43 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263450643; bh=iLq1x2+db1a5CEn22fX2L2eWN68=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=ezMMMk0gMe0poIaW5VtO5Bs7DM/14oEWtBlXhEQfh4OFKt/v6iY6Ddafo8tR2Fljj lGUpv5g4CQNDsuOl1XosA==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=t+kJDzN59iJRyQxdXcR/rd+dmjTe2Eihod5bG33dyVBiKepTNvJaTlWe7hjMpAVrc D1Gfbu+bC1GSQCU/cupDw==
Received: from pxi40 (pxi40.prod.google.com [10.243.27.40]) by kpbe18.cbf.corp.google.com with ESMTP id o0E6UfbB025697 for <oauth@ietf.org>; Wed, 13 Jan 2010 22:30:41 -0800
Received: by pxi40 with SMTP id 40so133268pxi.21 for <oauth@ietf.org>; Wed, 13 Jan 2010 22:30:41 -0800 (PST)
MIME-Version: 1.0
Received: by 10.114.243.14 with SMTP id q14mr251931wah.168.1263450641192; Wed,  13 Jan 2010 22:30:41 -0800 (PST)
In-Reply-To: <C773F42D.2D07C%eran@hueniverse.com>
References: <C773F42D.2D07C%eran@hueniverse.com>
From: John Panzer <jpanzer@google.com>
Date: Wed, 13 Jan 2010 22:30:21 -0800
Message-ID: <cb5f7a381001132230p690a4631wfc9022a3fc0a31bb@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=0016e64ca916a8d952047d1a06b3
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 06:30:49 -0000

--0016e64ca916a8d952047d1a06b3
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Jan 13, 2010 at 10:05 PM, Eran Hammer-Lahav <eran@hueniverse.com>wrote:

> Authentication Open Question #3: Should require using TLS/SSL/secure
> channel
> for any request made without a signature?
>
> WRAP got a lot of attention (mostly negative) to how it sends requests
> without using signatures or a secure channel. WRAP only uses HTTPS for
> obtaining tokens but does not mandate (or even suggests) using HTTPS for
> making protected resources requests. Instead, WRAP recommends short lived
> tokens that must be refreshed (using HTTPS).
>
> In a recent thread [1] on this list we reach (very small) consensus that
> the
> OAuth 1.0 protocol should mandate HTTPS for the PLAINTEXT method. The
> community edition only recommends it.
>

Actually, HTTPS or equivalent channel security was the consensus.


>
> QUESTIONS: Are there any valid (such that will pass IETF security review
> scrutiny) reasons for allowing unsigned requests to be sent in the clear
> over an insecure channel? Are there use cases for this (regardless of their
> security properties)?


There was also a discussion (initiated by Brian Eaton) regarding the
combination of short lived token plus refresh, which should be dug up.


>
> EHL
>
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00951.html
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--0016e64ca916a8d952047d1a06b3
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><div class=3D"gmail_quote">On Wed, Jan 13, 2010 at 10:05 PM, Eran Hamme=
r-Lahav <span dir=3D"ltr">&lt;<a href=3D"mailto:eran@hueniverse.com">eran@h=
ueniverse.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">

Authentication Open Question #3: Should require using TLS/SSL/secure channe=
l<br>
for any request made without a signature?<br>
<br>
WRAP got a lot of attention (mostly negative) to how it sends requests<br>
without using signatures or a secure channel. WRAP only uses HTTPS for<br>
obtaining tokens but does not mandate (or even suggests) using HTTPS for<br=
>
making protected resources requests. Instead, WRAP recommends short lived<b=
r>
tokens that must be refreshed (using HTTPS).<br>
<br>
In a recent thread [1] on this list we reach (very small) consensus that th=
e<br>
OAuth 1.0 protocol should mandate HTTPS for the PLAINTEXT method. The<br>
community edition only recommends it.<br></blockquote><div><br></div><div>A=
ctually, HTTPS or equivalent channel security was the consensus.</div><div>=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;borde=
r-left:1px #ccc solid;padding-left:1ex;">


<br>
QUESTIONS: Are there any valid (such that will pass IETF security review<br=
>
scrutiny) reasons for allowing unsigned requests to be sent in the clear<br=
>
over an insecure channel? Are there use cases for this (regardless of their=
<br>
security properties)?</blockquote><div><br></div><div>There was also a disc=
ussion (initiated by Brian Eaton) regarding the combination of short lived =
token plus refresh, which should be dug up. =A0</div><div>=A0</div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex;">


<br>
EHL<br>
<br>
[1] <a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg00951.=
html" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/=
msg00951.html</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br>

--0016e64ca916a8d952047d1a06b3--

From balfanz@google.com  Wed Jan 13 22:58:49 2010
Return-Path: <balfanz@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1FFFE3A68FE for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:58:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.976
X-Spam-Level: 
X-Spam-Status: No, score=-105.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G+HIBRqs-E5W for <oauth@core3.amsl.com>; Wed, 13 Jan 2010 22:58:24 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id 89F1F3A691C for <oauth@ietf.org>; Wed, 13 Jan 2010 22:58:23 -0800 (PST)
Received: from spaceape24.eur.corp.google.com (spaceape24.eur.corp.google.com [172.28.16.76]) by smtp-out.google.com with ESMTP id o0E6wHuX009728 for <oauth@ietf.org>; Thu, 14 Jan 2010 06:58:17 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263452299; bh=5I5Z1GrktvHJVv+7MTrmdhicfq0=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type; b=ZpOlzdvm4Q1qjVdMYhYB53Hbse41wmAk/pir7ykLUdtelRV5tJryy7x1peiUfvPZV 50bWpKnXAndDzxudAGjAA==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:x-system-of-record; b=WnjoRhxpZeYWYQGC13xSeWPKAVA9lR3vRZMK48STRenvrAYDOuXdda/SVBL7RWKXu BflsjSP3Mq3Iy9niw+Pjg==
Received: from pxi34 (pxi34.prod.google.com [10.243.27.34]) by spaceape24.eur.corp.google.com with ESMTP id o0E6wDxd029387 for <oauth@ietf.org>; Wed, 13 Jan 2010 22:58:16 -0800
Received: by pxi34 with SMTP id 34so137417pxi.8 for <oauth@ietf.org>; Wed, 13 Jan 2010 22:58:15 -0800 (PST)
MIME-Version: 1.0
Received: by 10.115.3.4 with SMTP id f4mr307602wai.10.1263452295329; Wed, 13  Jan 2010 22:58:15 -0800 (PST)
In-Reply-To: <C773F0E6.2D079%eran@hueniverse.com>
References: <C773F0E6.2D079%eran@hueniverse.com>
Date: Wed, 13 Jan 2010 22:58:15 -0800
Message-ID: <60c552b81001132258v5745db2ck431c8f7134940878@mail.gmail.com>
From: Dirk Balfanz <balfanz@google.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=0016e64dd71a40f734047d1a6921
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Include Normalized Request with Raw Request
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 06:58:51 -0000

--0016e64dd71a40f734047d1a6921
Content-Type: text/plain; charset=ISO-8859-1

On Wed, Jan 13, 2010 at 9:51 PM, Eran Hammer-Lahav <eran@hueniverse.com>wrote:

> Authentication Open Question #2: Should the normalized request be included
> with the request?
>
> In OAuth 1.0 the request is normalized into the signature base string by
> the
> client and the server. The base string itself is never sent with the
> request. Brian Eaton proposed [1] to include the signed string with the
> request, removing the need for the server to regenerate the normalized
> string, as well as allowing the client to use the included string to send
> additional (signed) information that is not part of the HTTP request.
>
> This is a significant departure from OAuth 1.0, but one that does call for
> an in-depth discussion.
>
> Some advantages to this approach are:
>
> - the server can easily verify what is being signed
> - the client can include additional parameters in the signed message
> - the request remains valid even if changed by proxies or other
> intermediaries
>

This is the part I didn't get in Brian's original thread, either.
Presumably, a request is valid only if the pieces in the normalized part and
in the raw part somehow match. If an (untrusted) proxy changes the raw
pieces, it destroys the request just like it would in normal OAuth, right?

I don't buy that we need to move heaven and earth just because some people
don't know how to put a signature base string together.

If we believe that the "meddling proxy" use cases are important to support
(i.e, we believe that a request modified by a third party should still carry
the same authority as the unmodified request), then we should just drop
signatures altogether and use bearer tokens. I don't see how getting rid of
the signature base string helps.

Dirk.

Some disadvantages are:
>
> - the request is sent twice, once raw and once normalized
> - it adds another place to make mistakes and create security holes if the
> server uses the raw data without fully comparing it to the normalized
> (signed) data
> - since any server enforcing security will only use the data contained in
> the normalized portion, it will create a de-facto standard for API requests
> (not nearly as heavy as SOAP or WS-*) in which case the request itself is
> normalized before sending.
>
> QUESTIONS: How do people feel about this? What are some other advantaged
> and
> disadvantages of this approach?
>
>
> EHL
>
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--0016e64dd71a40f734047d1a6921
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<br><br><div class=3D"gmail_quote">On Wed, Jan 13, 2010 at 9:51 PM, Eran Ha=
mmer-Lahav <span dir=3D"ltr">&lt;<a href=3D"mailto:eran@hueniverse.com">era=
n@hueniverse.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote"=
 style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
Authentication Open Question #2: Should the normalized request be included<=
br>
with the request?<br>
<br>
In OAuth 1.0 the request is normalized into the signature base string by th=
e<br>
client and the server. The base string itself is never sent with the<br>
request. Brian Eaton proposed [1] to include the signed string with the<br>
request, removing the need for the server to regenerate the normalized<br>
string, as well as allowing the client to use the included string to send<b=
r>
additional (signed) information that is not part of the HTTP request.<br>
<br>
This is a significant departure from OAuth 1.0, but one that does call for<=
br>
an in-depth discussion.<br>
<br>
Some advantages to this approach are:<br>
<br>
- the server can easily verify what is being signed<br>
- the client can include additional parameters in the signed message<br>
- the request remains valid even if changed by proxies or other<br>
intermediaries<br></blockquote><div><br></div><div>This is the part I didn&=
#39;t get in Brian&#39;s original thread, either. Presumably, a request is =
valid=A0only=A0if the pieces in the normalized part and in the raw part som=
ehow match. If an (untrusted) proxy changes the raw pieces, it destroys the=
 request just like it would in normal OAuth, right?</div>
<div>=A0</div><div>I don&#39;t buy that we need to move heaven and earth ju=
st because some people don&#39;t know how to put a signature base string to=
gether.=A0</div><div><br></div><div>If we believe that the &quot;meddling p=
roxy&quot; use cases are important to support (i.e, we believe that a reque=
st modified by a third party should still carry the same authority as the u=
nmodified request), then we should just drop signatures altogether and use =
bearer tokens. I don&#39;t see how getting rid of the signature base string=
 helps.=A0</div>
<div><br></div><div>Dirk.</div><div><br></div><blockquote class=3D"gmail_qu=
ote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex=
;">Some disadvantages are:<br>
<br>
- the request is sent twice, once raw and once normalized<br>
- it adds another place to make mistakes and create security holes if the<b=
r>
server uses the raw data without fully comparing it to the normalized<br>
(signed) data<br>
- since any server enforcing security will only use the data contained in<b=
r>
the normalized portion, it will create a de-facto standard for API requests=
<br>
(not nearly as heavy as SOAP or WS-*) in which case the request itself is<b=
r>
normalized before sending.<br>
<br>
QUESTIONS: How do people feel about this? What are some other advantaged an=
d<br>
disadvantages of this approach?<br>
<br>
<br>
EHL<br>
<br>
[1] <a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg00890.=
html" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current/=
msg00890.html</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br>

--0016e64dd71a40f734047d1a6921--

From john@jkemp.net  Thu Jan 14 03:35:15 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3BA903A6830 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 03:35:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level: 
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aguGE1bIJMyV for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 03:35:14 -0800 (PST)
Received: from outbound-mail-124.bluehost.com (outbound-mail-124.bluehost.com [67.222.38.24]) by core3.amsl.com (Postfix) with SMTP id 2888E3A67E1 for <oauth@ietf.org>; Thu, 14 Jan 2010 03:35:13 -0800 (PST)
Received: (qmail 6636 invoked by uid 0); 14 Jan 2010 11:35:10 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy4.bluehost.com with SMTP; 14 Jan 2010 11:35:10 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=uusAqjucI1dzexpWxXND6Vvec9aoeHXNKS/6oJjEg054hGiur73VgJnx1CiuH4IkKSh9cKGUNPXXVxODkHBShHwa7LUXCDW7e4+F0vzDGGmvq1Ki4zSY2/djikSyPRSj;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVNyo-0007sh-Cl; Thu, 14 Jan 2010 04:35:10 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <C773F42D.2D07C%eran@hueniverse.com>
Date: Thu, 14 Jan 2010 06:35:08 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 11:35:15 -0000

On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:

[...]
>=20
> QUESTIONS: Are there any valid (such that will pass IETF security =
review
> scrutiny) reasons for allowing unsigned requests to be sent in the =
clear
> over an insecure channel? Are there use cases for this (regardless of =
their
> security properties)?

I am still wavering on this.=20

I think that using a bearer token with short lifetime and one-time use =
semantics (for example) is probably sufficient security for many =
use-cases. And using TLS/SSL (or even just signing and verifying a =
signed request) in all cases may provide too much performance overhead =
for some of those cases.=20

In other words, I think that it's not only channel security we need to =
consider, but a combination of other measures that would, in some cases, =
obviate the need for TLS.

Regards,

- johnk


From romeda@gmail.com  Thu Jan 14 04:10:40 2010
Return-Path: <romeda@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 051233A672F for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 04:10:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fNZOXBdN9vjF for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 04:10:37 -0800 (PST)
Received: from fg-out-1718.google.com (fg-out-1718.google.com [72.14.220.158]) by core3.amsl.com (Postfix) with ESMTP id 78C1D3A63EC for <oauth@ietf.org>; Thu, 14 Jan 2010 04:10:37 -0800 (PST)
Received: by fg-out-1718.google.com with SMTP id e21so142457fga.13 for <oauth@ietf.org>; Thu, 14 Jan 2010 04:10:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:content-type :content-transfer-encoding; bh=rZx4RgpAH49k0P9WvT/4f21IhbEOpAvKnz80sCHKOaA=; b=Zk138W4W2KFIvqSJuKC9vn2P5Q/uTVXPnAUMOpXhgzNaVL/xTJ3xXzVn33uktcS5pw m9Z7WVnBk6J7DhyO1wgPvDjksyWR1+j1WKw+Y3wrl/0aCpa0OyrAIx9Vw/j/upsOAYtj nJVs7BfstWvfGJfzubrE9aLC2aVyoP/7IoMlk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type:content-transfer-encoding; b=IsE/3W+tGbiNp6SdTRkzK8QiirrwnkrkOayeIjtZGytcoLOtTKH6DPD2JnlX0p+ESk nXaQqPveZJbczvhLURaxOJhVFOzsLc9EIyoODoHvzgxknMP0CqppwXzYJIKjlQi1CKVY /0IKetuSLzhdQGdyXNOGulntoYKbt+6ElKNxI=
MIME-Version: 1.0
Received: by 10.103.79.28 with SMTP id g28mr320713mul.67.1263471031114; Thu,  14 Jan 2010 04:10:31 -0800 (PST)
In-Reply-To: <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>
From: Blaine Cook <romeda@gmail.com>
Date: Thu, 14 Jan 2010 12:10:11 +0000
Message-ID: <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
To: OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 12:10:40 -0000

OAuth WRAP is very similar to cookies as deployed by major vendors.

Google has just switched to HTTPS-by-default for all GMail
sessions[1], and my understanding (per [2]) is that access to
authenticated sessions (i.e., full GMail or Google Docs access versus
just displaying "bob@gmail.com" on the page) is always negotiated with
a secure cookie. Thus, Google has made decisions internally to secure
the equivalent of both the Refresh and the Bearer token, short-lived
assurances aside.

We're also entering an age where we have enough computing power to
*factor* RSA-1024 in non-infinite-time; handheld devices that are
realistically expected to use these protocols have sufficient
computing power and battery life to encrypt HTTP requests and decrypt
the responses (my phone already does this for all Twitter and email
requests; yours probably does, too).

As such, I can't see how *not* requiring SSL for unsigned requests
could pass muster at an IETF security review.

[1] http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.ht=
ml
[2] http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web=
-applications.html

2010/1/14 John Kemp <john@jkemp.net>:
>
> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>
> [...]
>>
>> QUESTIONS: Are there any valid (such that will pass IETF security review
>> scrutiny) reasons for allowing unsigned requests to be sent in the clear
>> over an insecure channel? Are there use cases for this (regardless of th=
eir
>> security properties)?
>
> I am still wavering on this.
>
> I think that using a bearer token with short lifetime and one-time use se=
mantics (for example) is probably sufficient security for many use-cases. A=
nd using TLS/SSL (or even just signing and verifying a signed request) in a=
ll cases may provide too much performance overhead for some of those cases.
>
> In other words, I think that it's not only channel security we need to co=
nsider, but a combination of other measures that would, in some cases, obvi=
ate the need for TLS.
>
> Regards,
>
> - johnk
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From romeda@gmail.com  Thu Jan 14 04:45:25 2010
Return-Path: <romeda@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6BF803A68F9 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 04:45:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jI-qnKMpCO1M for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 04:45:24 -0800 (PST)
Received: from mail-fx0-f215.google.com (mail-fx0-f215.google.com [209.85.220.215]) by core3.amsl.com (Postfix) with ESMTP id 3BAA63A687B for <oauth@ietf.org>; Thu, 14 Jan 2010 04:45:23 -0800 (PST)
Received: by fxm7 with SMTP id 7so2847702fxm.28 for <oauth@ietf.org>; Thu, 14 Jan 2010 04:45:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:cc:content-type; bh=smRTMsnAfmOldZ6BIh9JLty7BUDJMXY7kbDU5yNoGKo=; b=dmlW5jQ6WQ/h48Csy4ZJVpJxzZQ3mKPHCGFRImhwzDVlTpmwb6Syh5HdaDvM/VpsRd s0YFXWYVEmM7S9H97EeSPBlwsQvgSTHr93M82vfM86+KR/9qqIDSGoCpV96+LfNu4UcT nNtno0OyMPHqmiLGZVzeWTtpPaQ2NQtki5z8k=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=Ar6cqV1ZIPWyCdVPcTPvFFC2t6CDtofStQpkUOVcfCGYMPOS2SqNEfrIbLenJSFuUK G/a9g3TWQbQO/uH+9fSz5Xt2bVZPCmAyew9vsMvFjlH5x8OWMw574tq+ggCYLCQUEMW8 0Yh8Ms2j1qrVD8YBoCDOWBhj6Fn2R11lx9RA0=
MIME-Version: 1.0
Received: by 10.103.76.37 with SMTP id d37mr345148mul.105.1263473118122; Thu,  14 Jan 2010 04:45:18 -0800 (PST)
In-Reply-To: <C773EE67.2D076%eran@hueniverse.com>
References: <C773EE67.2D076%eran@hueniverse.com>
From: Blaine Cook <romeda@gmail.com>
Date: Thu, 14 Jan 2010 12:44:58 +0000
Message-ID: <d37b4b431001140444g3f20fc43n17495213418db69d@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=UTF-8
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 12:45:25 -0000

2010/1/14 Eran Hammer-Lahav <eran@hueniverse.com>:
> QUESTION: Do you prefer:
>
> A. Directly processing the HTTP request into a base string for signing
> (draft-hammer-oauth style).
> B. Treating the request as an API call with form-encoded parameters (OAuth
> 1.0 style).
> C. Converting the request into a normalized message and signing that (Eaton
> style).

For protocol independence of presenting a token + signed message, (C).
I wonder if John Panzer's recent proposal for Salmon [1] could be
adapted to use (C) elegantly? I think Salmon/PSHB is an interesting
use-case for delegated authorization and subsequent authentication,
and as such might be a good place to think about approaches like
Brian's.

b.

[1] http://www.abstractioneer.org/2010/01/magic-signatures-for-salmon.html

From romeda@gmail.com  Thu Jan 14 04:57:13 2010
Return-Path: <romeda@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B2CA13A659A for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 04:57:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zlc7coXfKxVv for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 04:57:12 -0800 (PST)
Received: from mail-fx0-f213.google.com (mail-fx0-f213.google.com [209.85.220.213]) by core3.amsl.com (Postfix) with ESMTP id 9E4F93A6873 for <oauth@ietf.org>; Thu, 14 Jan 2010 04:57:12 -0800 (PST)
Received: by fxm5 with SMTP id 5so2873126fxm.29 for <oauth@ietf.org>; Thu, 14 Jan 2010 04:57:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:content-type; bh=DonXV8vOJghKuuAxgmqmTF2G5UOQpZhVYWAWkUtaSEY=; b=WP9KEqImMLXrJ6TTaDreopTxzR+JVaYNPvnjr010sasX7eyW6A1iuWxx9iQMkQ5J7g kAS6zoNQHcpwsjQQZ+Hv5dOsQH6ARFLWyd5PKN0XtT9WhlV9K6Ae1DU0IY+zwDkpTkmL /4tiz8NRtQaLjsVn3fgXRjAPxa7FGv8bKB1Xk=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; b=jE8F0ZjzShhVtKQVs+Uob2n6Wh108Jwlmq2uDc1nsobR9E7uRMSoSpXced8iM+UlLl +e6h8nMhEvSbelnaWPpaNSml0INPcO6cu47Ruet6zm4OYm+kJ6zOmpHm06XbvkAWHfzi j+VBmU5oHr+jFE/Ky+irvYFK6t6XrhvdTwFBI=
MIME-Version: 1.0
Received: by 10.103.79.28 with SMTP id g28mr342018mul.67.1263473826169; Thu,  14 Jan 2010 04:57:06 -0800 (PST)
In-Reply-To: <d37b4b431001140444g3f20fc43n17495213418db69d@mail.gmail.com>
References: <C773EE67.2D076%eran@hueniverse.com> <d37b4b431001140444g3f20fc43n17495213418db69d@mail.gmail.com>
From: Blaine Cook <romeda@gmail.com>
Date: Thu, 14 Jan 2010 12:56:46 +0000
Message-ID: <d37b4b431001140456i7555f1c6h5c61bf0ce16aac2f@mail.gmail.com>
To: OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=UTF-8
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 12:57:13 -0000

2010/1/14 Blaine Cook <romeda@gmail.com>:
> 2010/1/14 Eran Hammer-Lahav <eran@hueniverse.com>:
>> QUESTION: Do you prefer:
>>
>> A. Directly processing the HTTP request into a base string for signing
>> (draft-hammer-oauth style).
>> B. Treating the request as an API call with form-encoded parameters (OAuth
>> 1.0 style).
>> C. Converting the request into a normalized message and signing that (Eaton
>> style).
>
> For protocol independence of presenting a token + signed message, (C).
> I wonder if John Panzer's recent proposal for Salmon [1] could be
> adapted to use (C) elegantly? I think Salmon/PSHB is an interesting
> use-case for delegated authorization and subsequent authentication,
> and as such might be a good place to think about approaches like
> Brian's.

On second thought (and after reading Eran's Question #2) I'd like to
clarify this a bit; I like that Brian's proposal makes it flexible to
determine what is to be signed. Including the data twice in the
request is silly; perhaps an approach like Brian's, but with the
"message" part replaced with pointers-to-the-message-parts.

e.g.,

instead of envelope:

{ "name": "source.example.com",
  "algorithm": "RSA-SHA256",
  "timestamp": 1260253850,
  "nonce": "0437f743b5809" }

and message:

{ "url": "http://source.example.com/x/y/z" }

just include the message-parts in the envelope:

{ "name": "source.example.com",
  "algorithm": "RSA-SHA256",
  "timestamp": 1260253850,
  "nonce": "0437f743b5809",
  "message": [ "url" ] }

See my reply to Eran's Question #2 for reasoning.

b.

From romeda@gmail.com  Thu Jan 14 05:09:13 2010
Return-Path: <romeda@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 621EF3A67FF for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 05:09:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f1xdwlVC-4iF for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 05:09:12 -0800 (PST)
Received: from mail-fx0-f213.google.com (mail-fx0-f213.google.com [209.85.220.213]) by core3.amsl.com (Postfix) with ESMTP id 6FC323A659A for <oauth@ietf.org>; Thu, 14 Jan 2010 05:09:12 -0800 (PST)
Received: by fxm5 with SMTP id 5so2885067fxm.29 for <oauth@ietf.org>; Thu, 14 Jan 2010 05:09:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:content-type; bh=+Ea+d4SlIyRxCICQdMPD75iv+T4aFL9nw+xcaByj5cY=; b=wFK+3+Euq3Z6BJgf44beGfs3aG3OBwhjLRr443oQbkF+trNUxwJ4f6Bi/o/g3RYhFC 5OxWofyDROuUbZGpXGYF0zBxQzWhE13dBcdPYI9kxaQBmvFL5B4XEot3T4ro4+yEIW0S kkAXfTkVp+gUdL2CcN5Msy4D+l4AiyV2eTcr0=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; b=UYXuGt5zcr8EzqpQChkylCnFNip9pe/Lpdvbc+HcKCAKKnXxAjH8AV18Qy4iZ0u6bF CJtB+HmgLiwpTg84uo+OS648zTNmgpKwWMkIfJ4FVpWT8/7ZEpAO1wRNtiY/29NsJVi+ /lQ/ahcHk5NVFHFgP0Wkkg7WMp7X012DeYnfY=
MIME-Version: 1.0
Received: by 10.103.79.28 with SMTP id g28mr347725mul.67.1263474544107; Thu,  14 Jan 2010 05:09:04 -0800 (PST)
In-Reply-To: <C773F0E6.2D079%eran@hueniverse.com>
References: <C773F0E6.2D079%eran@hueniverse.com>
From: Blaine Cook <romeda@gmail.com>
Date: Thu, 14 Jan 2010 13:08:44 +0000
Message-ID: <d37b4b431001140508p4eafb5ccn3e696f4d80f13d8f@mail.gmail.com>
To: OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=UTF-8
Subject: Re: [OAUTH-WG] Include Normalized Request with Raw Request
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 13:09:13 -0000

2010/1/14 Eran Hammer-Lahav <eran@hueniverse.com>:
> QUESTIONS: How do people feel about this? What are some other advantaged and
> disadvantages of this approach?

The disadvantages you outlined massively outweigh the advantages. I've
had a persistent search for OAuth on Twitter for some time now, and
anecdotally, people are "getting" it more, or the libraries are
getting better. In that sense, I echo Dirk's sentiment here.

The signature in OAuth 1.0+ and in draft-hammer-http-token-auth is
designed to break if someone implements something insecurely. The goal
of these mechanisms is not to make it easy for people to authenticate
insecurely. It's to make it as easy as possible (but no easier) to
ensure secure authentication.

b.

From eran@hueniverse.com  Thu Jan 14 05:46:46 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 060FB3A6829 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 05:46:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.427
X-Spam-Level: 
X-Spam-Status: No, score=-2.427 tagged_above=-999 required=5 tests=[AWL=0.172,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3f3nCcCvzY+a for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 05:46:42 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 737A73A67FB for <oauth@ietf.org>; Thu, 14 Jan 2010 05:46:14 -0800 (PST)
Received: (qmail 3134 invoked from network); 14 Jan 2010 13:45:53 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 14 Jan 2010 13:45:53 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 14 Jan 2010 06:45:49 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Thu, 14 Jan 2010 06:45:47 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqU4xrLcJCY/sVJRlecPL7UEQoaFgAPMVQ2
Message-ID: <C774600B.2D0A3%eran@hueniverse.com>
In-Reply-To: <cb5f7a381001132230p690a4631wfc9022a3fc0a31bb@mail.gmail.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 13:46:46 -0000

Replying everyone all at once...


On 1/13/10 10:30 PM, "John Panzer" <jpanzer@google.com> wrote:

>=20
> On Wed, Jan 13, 2010 at 10:05 PM, Eran Hammer-Lahav <eran@hueniverse.com>
> wrote:

>> In a recent thread [1] on this list we reach (very small) consensus that=
 the
>> OAuth 1.0 protocol should mandate HTTPS for the PLAINTEXT method. The
>> community edition only recommends it.
>=20
> Actually, HTTPS or equivalent channel security was the consensus.

It gets exhausting typing that every time. I have to assume people are
following the conversation a bit... :-)

>>=20
>> QUESTIONS: Are there any valid (such that will pass IETF security review
>> scrutiny) reasons for allowing unsigned requests to be sent in the clear
>> over an insecure channel? Are there use cases for this (regardless of th=
eir
>> security properties)?
>=20
> There was also a discussion (initiated by Brian Eaton) regarding the
> combination of short lived token plus refresh, which should be dug up. =
=A0

This is part of my question - is a fully exposed bearer token with a time
limit of an hour (which is what I have heard most of those advocating this
approach suggest) provide adequate security in line with IETF security
standards. I have a strong feeling it does not...


On 1/14/10 3:35 AM, "John Kemp" <john@jkemp.net> wrote:

> I am still wavering on this.
>=20
> I think that using a bearer token with short lifetime and one-time use
> semantics (for example) is probably sufficient security for many use-case=
s.
> And using TLS/SSL (or even just signing and verifying a signed request) i=
n all
> cases may provide too much performance overhead for some of those cases.

How short lived does it need to be to be sufficient? The attack vector is
trivial with the amount of open access points people use in public places.

> In other words, I think that it's not only channel security we need to
> consider, but a combination of other measures that would, in some cases,
> obviate the need for TLS.

Are there other 'combination of other measures' anyone has to offer than
making the bearer token short lived?


On 1/14/10 4:10 AM, "Blaine Cook" <romeda@gmail.com> wrote:

> OAuth WRAP is very similar to cookies as deployed by major vendors.

Which has been the argument made by some of the WRAP authors. I don't buy
it. Using this argument keeps web security broken and based on the broken
system we have today. We need to start fixing it somewhere and this is a
goof place.

> Google has just switched to HTTPS-by-default for all GMail
> sessions[1], and my understanding (per [2]) is that access to
> authenticated sessions (i.e., full GMail or Google Docs access versus
> just displaying "bob@gmail.com" on the page) is always negotiated with
> a secure cookie. Thus, Google has made decisions internally to secure
> the equivalent of both the Refresh and the Bearer token, short-lived
> assurances aside.
>
> We're also entering an age where we have enough computing power to
> *factor* RSA-1024 in non-infinite-time; handheld devices that are
> realistically expected to use these protocols have sufficient
> computing power and battery life to encrypt HTTP requests and decrypt
> the responses (my phone already does this for all Twitter and email
> requests; yours probably does, too).
>=20
> As such, I can't see how *not* requiring SSL for unsigned requests
> could pass muster at an IETF security review.

I completely agree.

EHL


From john@jkemp.net  Thu Jan 14 05:59:48 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 19D4E3A67FF for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 05:59:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level: 
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kDtUjGmQYfXL for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 05:59:46 -0800 (PST)
Received: from outbound-mail-311.bluehost.com (outbound-mail-311.bluehost.com [67.222.54.4]) by core3.amsl.com (Postfix) with SMTP id B9E573A67D9 for <oauth@ietf.org>; Thu, 14 Jan 2010 05:59:46 -0800 (PST)
Received: (qmail 22950 invoked by uid 0); 14 Jan 2010 13:59:43 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy6.bluehost.com with SMTP; 14 Jan 2010 13:59:43 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=tDfmgFa2J2r2Ip5njWYLVKSB5RGj1Q6SBjdW3nbk2nwgwHqK9cxGBH3zDPx1Qi224fI2iDH1D0grGtuvJn2OcNZIiH4vRbEBhBKXx/BojNcOQnMLL/2xe92e1iDkt9+U;
Received: from c-75-69-14-217.hsd1.vt.comcast.net ([75.69.14.217] helo=[192.168.0.65]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVQEh-0007xa-8i; Thu, 14 Jan 2010 06:59:43 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
Date: Thu, 14 Jan 2010 08:59:42 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
To: Blaine Cook <romeda@gmail.com>
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 75.69.14.217 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 13:59:48 -0000

Hi Blaine,

On Jan 14, 2010, at 7:10 AM, Blaine Cook wrote:

> OAuth WRAP is very similar to cookies as deployed by major vendors.

How is that relevant to _this_ discussion (I apologize, I don't know =
much about WRAP)?

>=20
> Google has just switched to HTTPS-by-default for all GMail
> sessions[1],

Yes, HTTPS by default, and they are doing it in order to secure the =
exchange of email - allowing emails to remain confidential on insecure =
networks. I think that is a strong use-case for requiring =
confidentiality.=20

But not all use-cases for OAuth need that much confidentiality, or any =
confidentiality at all.=20

> and my understanding (per [2]) is that access to
> authenticated sessions (i.e., full GMail or Google Docs access versus
> just displaying "bob@gmail.com" on the page) is always negotiated with
> a secure cookie. Thus, Google has made decisions internally to secure
> the equivalent of both the Refresh and the Bearer token, short-lived
> assurances aside.
>=20
> We're also entering an age where we have enough computing power to
> *factor* RSA-1024 in non-infinite-time; handheld devices that are
> realistically expected to use these protocols have sufficient
> computing power and battery life to encrypt HTTP requests and decrypt
> the responses (my phone already does this for all Twitter and email
> requests; yours probably does, too).

I guess my concern about performance is more at the server-side, where =
many requests may be processed more or less simultaneously. Back in the =
old days (1997) we had a special crypto hardware accelerator in our =
Internet-connected proxies, and our non-Internet connected machines =
wouldn't use SSL at all, because of the performance impact.=20

I'm sure things are better these days, but crypto operations still add =
performance overhead that may not in practice be necessary for every =
use-case. =20

>=20
> As such, I can't see how *not* requiring SSL for unsigned requests
> could pass muster at an IETF security review.

Well, I don't know what is required to pass IETF security review, and =
perhaps you're right, but the point is really whether there are cases =
where a combination of short-lifespan + replay-prevention and possibly =
other non-transport things could provide enough security to allow people =
to perform real work with OAuth tokens.=20

And I think there are such cases - rather vaguely I could say that the =
broad category would be anything for which a large volume of authorized =
requests is possible, and where the "value" in an individual request is =
low. That certainly does not include email, which I rather think _is_ =
deserving of confidentiality over insecure networks (of course, Gmail =
does allow you to turn off https if you are in a more secure network =
environment).

Regards,

- johnk

>=20
> [1] =
http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html
> [2] =
http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web-ap=
plications.html
>=20
> 2010/1/14 John Kemp <john@jkemp.net>:
>>=20
>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>=20
>> [...]
>>>=20
>>> QUESTIONS: Are there any valid (such that will pass IETF security =
review
>>> scrutiny) reasons for allowing unsigned requests to be sent in the =
clear
>>> over an insecure channel? Are there use cases for this (regardless =
of their
>>> security properties)?
>>=20
>> I am still wavering on this.
>>=20
>> I think that using a bearer token with short lifetime and one-time =
use semantics (for example) is probably sufficient security for many =
use-cases. And using TLS/SSL (or even just signing and verifying a =
signed request) in all cases may provide too much performance overhead =
for some of those cases.
>>=20
>> In other words, I think that it's not only channel security we need =
to consider, but a combination of other measures that would, in some =
cases, obviate the need for TLS.
>>=20
>> Regards,
>>=20
>> - johnk
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From stpeter@stpeter.im  Thu Jan 14 09:04:31 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 726073A6819 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 09:04:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=1.000,  BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iOY51NV2emWY for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 09:04:30 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 148383A67B2 for <oauth@ietf.org>; Thu, 14 Jan 2010 09:04:30 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id E4E0940D1C for <oauth@ietf.org>; Thu, 14 Jan 2010 10:04:26 -0700 (MST)
Message-ID: <4B4F4E99.6000503@stpeter.im>
Date: Thu, 14 Jan 2010 10:04:25 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000608070104040005070204"
Subject: [OAUTH-WG] meeting logistics for 2010-01-21
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 17:04:31 -0000

This is a cryptographically signed message in MIME format.

--------------ms000608070104040005070204
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

FYI, here is how to join the conference call on the 21st.

/psa

Begin forwarded message:

> *From: *IETF Secretariat <messenger@webex.com
> <mailto:messenger@webex.com>>
> *Date: *January 7, 2010 2:21:29 PM PST
> *To: *amorris@amsl.com <mailto:amorris@amsl.com>
> *Subject: **(Forward to attendees) Meeting invitation: OAuth WG Meeting=
*
> *Reply-To: *amorris@amsl.com <mailto:amorris@amsl.com>
>
> **** You can forward this email invitation to attendees ****
>
> Hello ,
>
> IETF Secretariat invites you to attend this online meeting.
>
> Topic: OAuth WG Meeting
> Date: Thursday, January 21, 2010
> Time: 7:00 pm, GMT Time (London, GMT)
> Meeting Number: 962 929 885
> Meeting Password: oauth
>
>
> -------------------------------------------------------
> To join the online meeting (Now from iPhones too!)
> -------------------------------------------------------
> 1. Go to
> https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3D=
NMTU2ODQyMWY5&RT=3DMiMyMQ%3D%3D
> <https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3D=
NMTU2ODQyMWY5&RT=3DMiMyMQ%3D%3D>
>
> 2. Enter your name and email address.
> 3. Enter the meeting password: oauth
> 4. Click "Join Now".
>
> To view in other time zones or languages, please click the link:
> https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3D=
NMTU2ODQyMWY5&ORT=3DMiMyMQ%3D%3D
> <https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3D=
NMTU2ODQyMWY5&ORT=3DMiMyMQ%3D%3D>
>
>
> -------------------------------------------------------
> To join the audio conference only
> -------------------------------------------------------
> To receive a call back, provide your phone number when you join the
> meeting, or call the number below and enter the access code.
> Call-in toll number (US/Canada): 1-408-792-6300
> Global call-in numbers:
> https://workgreen.webex.com/workgreen/globalcallin.php?serviceType=3DMC=
&ED=3D131214267&tollFree=3D0
> <https://workgreen.webex.com/workgreen/globalcallin.php?serviceType=3DM=
C&ED=3D131214267&tollFree=3D0>
>
>
> Access code:962 929 885
>
> -------------------------------------------------------
> For assistance
> -------------------------------------------------------
> 1. Go to https://workgreen.webex.com/workgreen/mc
> 2. On the left navigation bar, click "Support".
>
> You can contact me at:
> amorris@amsl.com <mailto:amorris@amsl.com>
> 1-510-492-4081
>
> To add this meeting to your calendar program (for example Microsoft
> Outlook), click this link:
> https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&ICS=3D=
MI&LD=3D1&RD=3D2&ST=3D1&SHA2=3DAs8wtkjE10I9RH8PuXiIBUJb2wRRzPbehnL4YFUSlN=
o=3D&RT=3DMiMyMQ%3D%3D
> <https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&ICS=
=3DMI&LD=3D1&RD=3D2&ST=3D1&SHA2=3DAs8wtkjE10I9RH8PuXiIBUJb2wRRzPbehnL4YFU=
SlNo=3D&RT=3DMiMyMQ%3D%3D>
>
>
> The playback of UCF (Universal Communications Format) rich media files
> requires appropriate players. To view this type of rich media files in
> the meeting, please check whether you have the players installed on
> your computer by going to
> https://workgreen.webex.com/workgreen/systemdiagnosis.php
>
> Sign up for a free trial of WebEx
> http://www.webex.com/go/mcemfreetrial
>
> http://www.webex.com
>
>
>
> IMPORTANT NOTICE: This WebEx service includes a feature that allows
> audio and any documents and other materials exchanged or viewed during
> the session to be recorded. By joining this session, you automatically
> consent to such recordings. If you do not consent to the recording, do
> not join the session.




--------------ms000608070104040005070204
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000608070104040005070204--

From jpanzer@google.com  Thu Jan 14 09:26:30 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9F9943A6405 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 09:26:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.976
X-Spam-Level: 
X-Spam-Status: No, score=-105.976 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4EmAiEMfelYn for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 09:26:29 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id E556B3A687F for <oauth@ietf.org>; Thu, 14 Jan 2010 09:26:28 -0800 (PST)
Received: from spaceape7.eur.corp.google.com (spaceape7.eur.corp.google.com [172.28.16.141]) by smtp-out.google.com with ESMTP id o0EHQONc010957 for <oauth@ietf.org>; Thu, 14 Jan 2010 17:26:24 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263489984; bh=jxyXBKLY0oNkhGQR1qXB7T9uWW0=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=rn4rJwBgfnruzsjJ2dUmWDJKIHwpoQ/9tT8hTz/NaAPzIGIINVZLEZGPYUoxpmfmP kqsr2oaJ3U703m7FWRjNg==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=v86807rrVg3b8n8As1BaEQ/fhqwJzfmEvILqaUQEikP3OO5SF9UhX/W6V3OVT0Xeo aAo8bS6VYqr5bHSiNAWhQ==
Received: from pxi32 (pxi32.prod.google.com [10.243.27.32]) by spaceape7.eur.corp.google.com with ESMTP id o0EHPDpX025252 for <oauth@ietf.org>; Thu, 14 Jan 2010 09:26:23 -0800
Received: by pxi32 with SMTP id 32so518788pxi.15 for <oauth@ietf.org>; Thu, 14 Jan 2010 09:26:23 -0800 (PST)
MIME-Version: 1.0
Received: by 10.115.134.25 with SMTP id l25mr720103wan.196.1263489981138; Thu,  14 Jan 2010 09:26:21 -0800 (PST)
In-Reply-To: <d37b4b431001140508p4eafb5ccn3e696f4d80f13d8f@mail.gmail.com>
References: <C773F0E6.2D079%eran@hueniverse.com> <d37b4b431001140508p4eafb5ccn3e696f4d80f13d8f@mail.gmail.com>
From: John Panzer <jpanzer@google.com>
Date: Thu, 14 Jan 2010 09:26:01 -0800
Message-ID: <cb5f7a381001140926h43cf68bapdec683a2a3a6528b@mail.gmail.com>
To: Blaine Cook <romeda@gmail.com>
Content-Type: multipart/alternative; boundary=0016e64be8e880c7f5047d232fd3
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Include Normalized Request with Raw Request
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 17:26:30 -0000

--0016e64be8e880c7f5047d232fd3
Content-Type: text/plain; charset=ISO-8859-1

As mentioned (in a separate thread?) Salmon's magic envelope mechanism does
something similar, albeit without requiring JSON.  However Salmon has a
harder requirement, to have the signature survive not only a single hop and
untrusted proxies, but also storage and re-syndication.  Not clear on
whether this nail requires such a big hammer.

I will note that if the magic envelope mechanism [1] were used, it wouldn't
have to send the payload twice, but clients would need to know about the
format.  On the other hand, it does make it ~impossible to accidentally use
data without checking the signature, assuming libraries refuse to open the
envelope without a valid signature.

Not advocating either way, just thinking out loud.

--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer

[1] Synopsis of magic envelope:  base64 encode whatever you've got as a
payload, sign the result.  Include the exact thing signed as your new
payload, wrapped in a trivial envelope that identifies what it is -- that
could be XML, JSON, or simply a MIME type in an HTTP request.  When you want
the data, you base64 decode first.  And check the signature while you're at
it.





On Thu, Jan 14, 2010 at 5:08 AM, Blaine Cook <romeda@gmail.com> wrote:

> 2010/1/14 Eran Hammer-Lahav <eran@hueniverse.com>:
> > QUESTIONS: How do people feel about this? What are some other advantaged
> and
> > disadvantages of this approach?
>
> The disadvantages you outlined massively outweigh the advantages. I've
> had a persistent search for OAuth on Twitter for some time now, and
> anecdotally, people are "getting" it more, or the libraries are
> getting better. In that sense, I echo Dirk's sentiment here.
>
> The signature in OAuth 1.0+ and in draft-hammer-http-token-auth is
> designed to break if someone implements something insecurely. The goal
> of these mechanisms is not to make it easy for people to authenticate
> insecurely. It's to make it as easy as possible (but no easier) to
> ensure secure authentication.
>
> b.
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--0016e64be8e880c7f5047d232fd3
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

As mentioned (in a separate thread?) Salmon&#39;s magic envelope mechanism =
does something similar, albeit without requiring JSON. =A0However Salmon ha=
s a harder requirement, to have the signature survive not only a single hop=
 and untrusted proxies, but also storage and re-syndication. =A0Not clear o=
n whether this nail requires such a big hammer.<div>

<br><div>I will note that if the magic envelope mechanism [1] were used, it=
 wouldn&#39;t have to send the payload twice, but clients would need to kno=
w about the format. =A0On the other hand, it does make it ~impossible to ac=
cidentally use data without checking the signature, assuming libraries refu=
se to open the envelope without a valid signature. =A0</div>

<div><br></div><div>Not advocating either way, just thinking out loud.</div=
><div><br></div><div>--<br>John Panzer / Google<br><a href=3D"mailto:jpanze=
r@google.com">jpanzer@google.com</a> / <a href=3D"http://abstractioneer.org=
">abstractioneer.org</a> / @jpanzer</div>

<div><br></div><div>[1] Synopsis of magic envelope: =A0base64 encode whatev=
er you&#39;ve got as a payload, sign the result. =A0Include the exact thing=
 signed as your new payload, wrapped in a trivial envelope that identifies =
what it is -- that could be XML, JSON, or simply a MIME type in an HTTP req=
uest. =A0When you want the data, you base64 decode first. =A0And check the =
signature while you&#39;re at it.</div>

<div><br clear=3D"all"><br><br>
<br><br><div class=3D"gmail_quote">On Thu, Jan 14, 2010 at 5:08 AM, Blaine =
Cook <span dir=3D"ltr">&lt;<a href=3D"mailto:romeda@gmail.com">romeda@gmail=
.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">

2010/1/14 Eran Hammer-Lahav &lt;<a href=3D"mailto:eran@hueniverse.com">eran=
@hueniverse.com</a>&gt;:<br>
<div class=3D"im">&gt; QUESTIONS: How do people feel about this? What are s=
ome other advantaged and<br>
&gt; disadvantages of this approach?<br>
<br>
</div>The disadvantages you outlined massively outweigh the advantages. I&#=
39;ve<br>
had a persistent search for OAuth on Twitter for some time now, and<br>
anecdotally, people are &quot;getting&quot; it more, or the libraries are<b=
r>
getting better. In that sense, I echo Dirk&#39;s sentiment here.<br>
<br>
The signature in OAuth 1.0+ and in draft-hammer-http-token-auth is<br>
designed to break if someone implements something insecurely. The goal<br>
of these mechanisms is not to make it easy for people to authenticate<br>
insecurely. It&#39;s to make it as easy as possible (but no easier) to<br>
ensure secure authentication.<br>
<font color=3D"#888888"><br>
b.<br>
</font><div><div></div><div class=3D"h5">__________________________________=
_____________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br></div></div>

--0016e64be8e880c7f5047d232fd3--

From faynberg@alcatel-lucent.com  Thu Jan 14 11:06:38 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F01743A684C for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:06:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level: 
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[AWL=1.000,  BAYES_00=-2.599, GB_I_LETTER=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T8J4I00v17o1 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:06:37 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id 002373A6872 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:06:36 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id o0EJ6GOj008148 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Jan 2010 13:06:16 -0600 (CST)
Received: from [135.244.24.239] (faynberg.lra.lucent.com [135.244.24.239]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0EJ6Fcf019232; Thu, 14 Jan 2010 13:06:16 -0600 (CST)
Message-ID: <4B4F6B27.5020608@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 14:06:15 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Blaine Cook <romeda@gmail.com>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
In-Reply-To: <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 19:06:38 -0000

I agree that TLS (which, in the IETF, sprobably a better three-letter 
word than SSL) is the simplest solution, and the one that is 
implementable. 

Igor


Blaine Cook wrote:
> OAuth WRAP is very similar to cookies as deployed by major vendors.
>
> Google has just switched to HTTPS-by-default for all GMail
> sessions[1], and my understanding (per [2]) is that access to
> authenticated sessions (i.e., full GMail or Google Docs access versus
> just displaying "bob@gmail.com" on the page) is always negotiated with
> a secure cookie. Thus, Google has made decisions internally to secure
> the equivalent of both the Refresh and the Bearer token, short-lived
> assurances aside.
>
> We're also entering an age where we have enough computing power to
> *factor* RSA-1024 in non-infinite-time; handheld devices that are
> realistically expected to use these protocols have sufficient
> computing power and battery life to encrypt HTTP requests and decrypt
> the responses (my phone already does this for all Twitter and email
> requests; yours probably does, too).
>
> As such, I can't see how *not* requiring SSL for unsigned requests
> could pass muster at an IETF security review.
>
> [1] http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html
> [2] http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web-applications.html
>
> 2010/1/14 John Kemp <john@jkemp.net>:
>   
>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>
>> [...]
>>     
>>> QUESTIONS: Are there any valid (such that will pass IETF security review
>>> scrutiny) reasons for allowing unsigned requests to be sent in the clear
>>> over an insecure channel? Are there use cases for this (regardless of their
>>> security properties)?
>>>       
>> I am still wavering on this.
>>
>> I think that using a bearer token with short lifetime and one-time use semantics (for example) is probably sufficient security for many use-cases. And using TLS/SSL (or even just signing and verifying a signed request) in all cases may provide too much performance overhead for some of those cases.
>>
>> In other words, I think that it's not only channel security we need to consider, but a combination of other measures that would, in some cases, obviate the need for TLS.
>>
>> Regards,
>>
>> - johnk
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>>     
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   


From faynberg@alcatel-lucent.com  Thu Jan 14 11:15:51 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B13943A6810 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:15:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.099
X-Spam-Level: 
X-Spam-Status: No, score=-3.099 tagged_above=-999 required=5 tests=[AWL=-0.500, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GRAQAZJCEOnV for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:15:50 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id 80E2C3A6872 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:15:49 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id o0EJFeod015169 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Jan 2010 13:15:40 -0600 (CST)
Received: from [135.244.24.239] (faynberg.lra.lucent.com [135.244.24.239]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0EJFdxV003909; Thu, 14 Jan 2010 13:15:39 -0600 (CST)
Message-ID: <4B4F6D5A.8010604@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 14:15:38 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: John Kemp <john@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>	<d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net>
In-Reply-To: <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 19:15:51 -0000

John Kemp wrote:
> ...
> And I think there are such cases - rather vaguely I could say that the broad category would be anything for which a large volume of authorized requests is possible, and where the "value" in an individual request is low. That certainly does not include email, which I rather think _is_ deserving of confidentiality over insecure networks (of course, Gmail does allow you to turn off https if you are in a more secure network environment).
>
> ...
There definitely are such use cases. For instance, if I kept a photo 
album on Flicker and asked Kodak to print it, I personally would not 
care if others got access to this album by replaying (or just learned 
that I was trying to print some pictures). But I envision that OAuth 
will be used in much more serious cases, where the "value" will be high. 
The problem is that allowing individuals users to judge the value, 
understand the risks, and make their own decisions in specific cases is 
not a good idea. The protocol must enforce it.

Igor

From jpanzer@google.com  Thu Jan 14 11:29:31 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 16EA53A698B for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:29:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.976
X-Spam-Level: 
X-Spam-Status: No, score=-105.976 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJ2-eca+uE7d for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:29:30 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id 32A493A6990 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:29:29 -0800 (PST)
Received: from kpbe15.cbf.corp.google.com (kpbe15.cbf.corp.google.com [172.25.105.79]) by smtp-out.google.com with ESMTP id o0EJTMLE005581 for <oauth@ietf.org>; Thu, 14 Jan 2010 19:29:23 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263497365; bh=lIDYp7mQ4+9X6mZ9xa1Xfml4+2U=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=xYqSuBxlnM5fuo/bE6uHV7w0c8Mx5NfW2yHPg9YsBvbdRK5aOwmrFS27njmxZOpJ7 znuSoyzQjAdqiv3kN2prg==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=QUoDYbQ2C3c57nPjE1mrGIqVfaTl6cnn9CbCeqvskc40Rj/XRqJ9yc6+SK6yEsXWm NsA5AnEGXlzicp3E+BLcQ==
Received: from pxi33 (pxi33.prod.google.com [10.243.27.33]) by kpbe15.cbf.corp.google.com with ESMTP id o0EJSOO4026725 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:29:22 -0800
Received: by pxi33 with SMTP id 33so595773pxi.10 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:29:21 -0800 (PST)
MIME-Version: 1.0
Received: by 10.115.113.6 with SMTP id q6mr855546wam.55.1263497361571; Thu, 14  Jan 2010 11:29:21 -0800 (PST)
In-Reply-To: <4B4F6D5A.8010604@alcatel-lucent.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>  <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>  <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com>
From: John Panzer <jpanzer@google.com>
Date: Thu, 14 Jan 2010 11:29:01 -0800
Message-ID: <cb5f7a381001141129v2c692b10k19aaceb3a09e76ca@mail.gmail.com>
To: faynberg@alcatel-lucent.com
Content-Type: multipart/alternative; boundary=0016e64af4a86941ad047d24e74b
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 19:29:31 -0000

--0016e64af4a86941ad047d24e74b
Content-Type: text/plain; charset=ISO-8859-1

On Thu, Jan 14, 2010 at 11:15 AM, Igor Faynberg <faynberg@alcatel-lucent.com
> wrote:

> John Kemp wrote:
>
>> ...
>>
>> And I think there are such cases - rather vaguely I could say that the
>> broad category would be anything for which a large volume of authorized
>> requests is possible, and where the "value" in an individual request is low.
>> That certainly does not include email, which I rather think _is_ deserving
>> of confidentiality over insecure networks (of course, Gmail does allow you
>> to turn off https if you are in a more secure network environment).
>>
>> ...
>>
> There definitely are such use cases. For instance, if I kept a photo album
> on Flicker and asked Kodak to print it, I personally would not care if
> others got access to this album by replaying (or just learned that I was
> trying to print some pictures). But I envision that OAuth will be used in
> much more serious cases, where the "value" will be high. The problem is that
> allowing individuals users to judge the value, understand the risks, and
> make their own decisions in specific cases is not a good idea. The protocol
> must enforce it.
>

Are you saying that the protocol must enforce "strongest auth" in all cases?
 Or that the protocol must understand the security implications of the data
and make appropriate decisions?  (I'm assuming the former.)


>
> Igor
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--0016e64af4a86941ad047d24e74b
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div class=3D"gmail_quote">On Thu, Jan 14, 2010 at 11:15 AM, Igor Faynberg =
<span dir=3D"ltr">&lt;<a href=3D"mailto:faynberg@alcatel-lucent.com">faynbe=
rg@alcatel-lucent.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_q=
uote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1e=
x;">

John Kemp wrote:<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
...<div class=3D"im"><br>
And I think there are such cases - rather vaguely I could say that the broa=
d category would be anything for which a large volume of authorized request=
s is possible, and where the &quot;value&quot; in an individual request is =
low. That certainly does not include email, which I rather think _is_ deser=
ving of confidentiality over insecure networks (of course, Gmail does allow=
 you to turn off https if you are in a more secure network environment).<br=
>


<br></div>
...<br>
</blockquote>
There definitely are such use cases. For instance, if I kept a photo album =
on Flicker and asked Kodak to print it, I personally would not care if othe=
rs got access to this album by replaying (or just learned that I was trying=
 to print some pictures). But I envision that OAuth will be used in much mo=
re serious cases, where the &quot;value&quot; will be high. The problem is =
that allowing individuals users to judge the value, understand the risks, a=
nd make their own decisions in specific cases is not a good idea. The proto=
col must enforce it.<br>

</blockquote><div><br></div><div>Are you saying that the protocol must enfo=
rce &quot;strongest auth&quot; in all cases? =A0Or that the protocol must u=
nderstand the security implications of the data and make appropriate decisi=
ons? =A0(I&#39;m assuming the former.)</div>

<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex;"><font color=3D"#888888">
<br>
Igor</font><div><div></div><div class=3D"h5"><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br>

--0016e64af4a86941ad047d24e74b--

From john@jkemp.net  Thu Jan 14 11:37:37 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EEF893A69B2 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:37:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level: 
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JZXyL6QGEfaH for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:37:37 -0800 (PST)
Received: from outbound-mail-313.bluehost.com (outbound-mail-313.bluehost.com [67.222.54.6]) by core3.amsl.com (Postfix) with SMTP id E865E3A69A4 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:37:36 -0800 (PST)
Received: (qmail 4324 invoked by uid 0); 14 Jan 2010 19:37:32 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy6.bluehost.com with SMTP; 14 Jan 2010 19:37:32 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=VD3kFYF5ZYyrD7b3JbphWDQRjs5+dtdg9aEdAsuAB12V1wzxP1eSOeBOShfhDQm5sYAXTb1wWUFz/SObYQeauUU+kab9zA0ZafnX+VliqI/Y4/yKKJ+QSKeSsVAC2Cxg;
Received: from c-75-69-14-217.hsd1.vt.comcast.net ([75.69.14.217] helo=[192.168.0.65]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVVVc-0005cb-Bv; Thu, 14 Jan 2010 12:37:32 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <4B4F6D5A.8010604@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 14:37:27 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>	<d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com>
To: faynberg@alcatel-lucent.com
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 75.69.14.217 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 19:37:38 -0000

On Jan 14, 2010, at 2:15 PM, Igor Faynberg wrote:

> John Kemp wrote:
>> ...
>> And I think there are such cases - rather vaguely I could say that =
the broad category would be anything for which a large volume of =
authorized requests is possible, and where the "value" in an individual =
request is low. That certainly does not include email, which I rather =
think _is_ deserving of confidentiality over insecure networks (of =
course, Gmail does allow you to turn off https if you are in a more =
secure network environment).
>>=20
>> ...
> There definitely are such use cases. For instance, if I kept a photo =
album on Flicker and asked Kodak to print it, I personally would not =
care if others got access to this album by replaying (or just learned =
that I was trying to print some pictures). But I envision that OAuth =
will be used in much more serious cases, where the "value" will be high. =
The problem is that allowing individuals users to judge the value, =
understand the risks, and make their own decisions in specific cases is =
not a good idea. The protocol must enforce it.

What delegated authorization protocol should be used to deal with those =
"not so serious" use-cases then, if OAuth makes them too expensive?

Cheers,

- johnk=

From faynberg@alcatel-lucent.com  Thu Jan 14 11:41:23 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3E9413A6784 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:41:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.932
X-Spam-Level: 
X-Spam-Status: No, score=-2.932 tagged_above=-999 required=5 tests=[AWL=-0.333, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T7BQ3iwuJ75T for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:41:22 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id B75533A69A3 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:41:21 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id o0EJfDfe007180 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Jan 2010 13:41:13 -0600 (CST)
Received: from [135.244.24.239] (faynberg.lra.lucent.com [135.244.24.239]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0EJfC0h005366; Thu, 14 Jan 2010 13:41:13 -0600 (CST)
Message-ID: <4B4F7358.5080602@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 14:41:12 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: John Panzer <jpanzer@google.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com> <cb5f7a381001141129v2c692b10k19aaceb3a09e76ca@mail.gmail.com>
In-Reply-To: <cb5f7a381001141129v2c692b10k19aaceb3a09e76ca@mail.gmail.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 19:41:23 -0000

John Panzer wrote:
> ...
>
> Are you saying that the protocol must enforce "strongest auth" in all 
> cases?  Or that the protocol must understand the security implications 
> of the data and make appropriate decisions?  (I'm assuming the former.)
>  
>
>

Yes, exactly.  I am for the "strongest auth." 

Igor

From faynberg@alcatel-lucent.com  Thu Jan 14 11:53:23 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BC3373A6872 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:53:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.849
X-Spam-Level: 
X-Spam-Status: No, score=-2.849 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SNlv67QLdjRK for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 11:53:23 -0800 (PST)
Received: from ihemail2.lucent.com (ihemail2.lucent.com [135.245.0.35]) by core3.amsl.com (Postfix) with ESMTP id DA08F3A63C9 for <oauth@ietf.org>; Thu, 14 Jan 2010 11:53:19 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail2.lucent.com (8.13.8/IER-o) with ESMTP id o0EJrDPf016876 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Jan 2010 13:53:13 -0600 (CST)
Received: from [135.244.24.239] (faynberg.lra.lucent.com [135.244.24.239]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0EJrC1B018071; Thu, 14 Jan 2010 13:53:12 -0600 (CST)
Message-ID: <4B4F7628.9030709@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 14:53:12 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: John Kemp <john@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>	<d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com> <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net>
In-Reply-To: <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.35
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 19:53:23 -0000

John Kemp wrote:
> ...
> What delegated authorization protocol should be used to deal with those "not so serious" use-cases then, if OAuth makes them too expensive?
>
>   
I expected this question and dreaded it.  I don't have a good answer, 
and I don't think there is one. (In my defense, the airport security 
cannot find the way around the 
wait-wait-wait/shoes-off/belts-off/watches-off routine for "good" 
people--who are actually the majority.)

One not-so-good answer, but--I think--a workable one is to consider an 
(enumerated type) parameter carrying a required security value, 
something that would have to come from the user initially, and then 
specify TLS or any other cryptographic delicacy based on such value. The 
only problem is that end users might happily settle for the highest 
security, anyway (unless they have to pay for it).

Igor

From stpeter@stpeter.im  Thu Jan 14 13:36:45 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 29DEF3A6875 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 13:36:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.742
X-Spam-Level: 
X-Spam-Status: No, score=-3.742 tagged_above=-999 required=5 tests=[AWL=0.857,  BAYES_00=-2.599, GB_I_INVITATION=-2]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LfHzHqoymErO for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 13:36:43 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id C92453A67FD for <oauth@ietf.org>; Thu, 14 Jan 2010 13:36:43 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 8072E40D1C for <oauth@ietf.org>; Thu, 14 Jan 2010 14:36:40 -0700 (MST)
Message-ID: <4B4F8E67.9090601@stpeter.im>
Date: Thu, 14 Jan 2010 14:36:39 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: oauth@ietf.org
References: <4B4F4E99.6000503@stpeter.im>
In-Reply-To: <4B4F4E99.6000503@stpeter.im>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms030306060708080705090000"
Subject: Re: [OAUTH-WG] meeting logistics for 2010-01-21
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 21:36:45 -0000

This is a cryptographically signed message in MIME format.

--------------ms030306060708080705090000
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Naturally, we'll also have the chatroom:

xmpp:oauth@jabber.ietf.org?join

On 1/14/10 10:04 AM, Peter Saint-Andre wrote:
> FYI, here is how to join the conference call on the 21st.
>=20
> /psa
>=20
> Begin forwarded message:
>=20
>> *From: *IETF Secretariat <messenger@webex.com
>> <mailto:messenger@webex.com>>
>> *Date: *January 7, 2010 2:21:29 PM PST
>> *To: *amorris@amsl.com <mailto:amorris@amsl.com>
>> *Subject: **(Forward to attendees) Meeting invitation: OAuth WG Meetin=
g*
>> *Reply-To: *amorris@amsl.com <mailto:amorris@amsl.com>
>>
>> **** You can forward this email invitation to attendees ****
>>
>> Hello ,
>>
>> IETF Secretariat invites you to attend this online meeting.
>>
>> Topic: OAuth WG Meeting
>> Date: Thursday, January 21, 2010
>> Time: 7:00 pm, GMT Time (London, GMT)
>> Meeting Number: 962 929 885
>> Meeting Password: oauth
>>
>>
>> -------------------------------------------------------
>> To join the online meeting (Now from iPhones too!)
>> -------------------------------------------------------
>> 1. Go to
>> https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3D=
NMTU2ODQyMWY5&RT=3DMiMyMQ%3D%3D
>> <https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=
=3DNMTU2ODQyMWY5&RT=3DMiMyMQ%3D%3D>
>>
>> 2. Enter your name and email address.
>> 3. Enter the meeting password: oauth
>> 4. Click "Join Now".
>>
>> To view in other time zones or languages, please click the link:
>> https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3D=
NMTU2ODQyMWY5&ORT=3DMiMyMQ%3D%3D
>> <https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=
=3DNMTU2ODQyMWY5&ORT=3DMiMyMQ%3D%3D>
>>
>>
>> -------------------------------------------------------
>> To join the audio conference only
>> -------------------------------------------------------
>> To receive a call back, provide your phone number when you join the
>> meeting, or call the number below and enter the access code.
>> Call-in toll number (US/Canada): 1-408-792-6300
>> Global call-in numbers:
>> https://workgreen.webex.com/workgreen/globalcallin.php?serviceType=3DM=
C&ED=3D131214267&tollFree=3D0
>> <https://workgreen.webex.com/workgreen/globalcallin.php?serviceType=3D=
MC&ED=3D131214267&tollFree=3D0>
>>
>>
>> Access code:962 929 885
>>
>> -------------------------------------------------------
>> For assistance
>> -------------------------------------------------------
>> 1. Go to https://workgreen.webex.com/workgreen/mc
>> 2. On the left navigation bar, click "Support".
>>
>> You can contact me at:
>> amorris@amsl.com <mailto:amorris@amsl.com>
>> 1-510-492-4081
>>
>> To add this meeting to your calendar program (for example Microsoft
>> Outlook), click this link:
>> https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&ICS=
=3DMI&LD=3D1&RD=3D2&ST=3D1&SHA2=3DAs8wtkjE10I9RH8PuXiIBUJb2wRRzPbehnL4YFU=
SlNo=3D&RT=3DMiMyMQ%3D%3D
>> <https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&IC=
S=3DMI&LD=3D1&RD=3D2&ST=3D1&SHA2=3DAs8wtkjE10I9RH8PuXiIBUJb2wRRzPbehnL4YF=
USlNo=3D&RT=3DMiMyMQ%3D%3D>
>>
>>
>> The playback of UCF (Universal Communications Format) rich media files=

>> requires appropriate players. To view this type of rich media files in=

>> the meeting, please check whether you have the players installed on
>> your computer by going to
>> https://workgreen.webex.com/workgreen/systemdiagnosis.php
>>
>> Sign up for a free trial of WebEx
>> http://www.webex.com/go/mcemfreetrial
>>
>> http://www.webex.com
>>
>>
>>
>> IMPORTANT NOTICE: This WebEx service includes a feature that allows
>> audio and any documents and other materials exchanged or viewed during=

>> the session to be recorded. By joining this session, you automatically=

>> consent to such recordings. If you do not consent to the recording, do=

>> not join the session.
>=20
>=20
>=20
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--------------ms030306060708080705090000
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms030306060708080705090000--

From email@pbryan.net  Thu Jan 14 14:31:00 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E432D3A6833 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:31:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.452
X-Spam-Level: 
X-Spam-Status: No, score=-1.452 tagged_above=-999 required=5 tests=[AWL=1.148,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HczkzKPFX26S for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:31:00 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id 2B6503A69EF for <oauth@ietf.org>; Thu, 14 Jan 2010 14:30:57 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id CCBFA6791 for <oauth@ietf.org>; Thu, 14 Jan 2010 22:30:53 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <C773EE67.2D076%eran@hueniverse.com>
References: <C773EE67.2D076%eran@hueniverse.com>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 14 Jan 2010 14:30:49 -0800
Message-ID: <1263508249.25688.7.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 22:31:01 -0000

On Wed, 2010-01-13 at 22:40 -0700, Eran Hammer-Lahav wrote:
> Authentication Open Question #1: What to sign?
> 
> OAuth Core 1.0 was designed to sign API requests made using common
> form-encoded formats. The main component of the 1.0 signature base string
> are the parameters. The host and HTTP methods are important but were never
> the focus on the signed content.
> 
> draft-hammer-oauth does not change the process but does describe the process
> very differently, changing the focus form signing API requests and
> parameters to signing HTTP requests (partially).
> draft-hammer-http-token-auth takes this approach a step further and focuses
> on signing the raw HTTP request components, completely ignoring their
> meaning as used by API calls. The end result is very similar but the
> differences are important.
> 
> Brian Eaton proposed [1] an alternative approach to sign messages instead of
> API calls or HTTP request. In his proposal, the HTTP request (or API call
> based on your perspective) in transformed into a message (in his case using
> a JSON-based format) which is then signed. This additional layer of
> abstraction allows the use of the method with other transports or use cases
> in which parameters are not sent in the request URI or body.
> 
> QUESTION: Do you prefer:
> 
> A. Directly processing the HTTP request into a base string for signing
> (draft-hammer-oauth style).
> B. Treating the request as an API call with form-encoded parameters (OAuth
> 1.0 style).
> C. Converting the request into a normalized message and signing that (Eaton
> style).

I lean toward having an extensible, normalized structure that can be
signed. As pointed-out by Blane, I think Eaton style (C) gives the most
amount of flexibility in this regard.

> 
> EHL
> 
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Paul


From email@pbryan.net  Thu Jan 14 14:42:06 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B90933A69FF for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:42:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.025
X-Spam-Level: 
X-Spam-Status: No, score=-2.025 tagged_above=-999 required=5 tests=[AWL=0.574,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fBb4g9u2QG-u for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:42:06 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id E7DE13A69F2 for <oauth@ietf.org>; Thu, 14 Jan 2010 14:42:05 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id EBC156791 for <oauth@ietf.org>; Thu, 14 Jan 2010 22:42:02 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <C773F0E6.2D079%eran@hueniverse.com>
References: <C773F0E6.2D079%eran@hueniverse.com>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 14 Jan 2010 14:41:58 -0800
Message-ID: <1263508918.25688.14.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 8bit
Subject: Re: [OAUTH-WG] Include Normalized Request with Raw Request
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 22:42:06 -0000

On Wed, 2010-01-13 at 22:51 -0700, Eran Hammer-Lahav wrote:
> Authentication Open Question #2: Should the normalized request be included
> with the request?
> 
> In OAuth 1.0 the request is normalized into the signature base string by the
> client and the server. The base string itself is never sent with the
> request. Brian Eaton proposed [1] to include the signed string with the
> request, removing the need for the server to regenerate the normalized
> string, as well as allowing the client to use the included string to send
> additional (signed) information that is not part of the HTTP request.
> 
> This is a significant departure from OAuth 1.0, but one that does call for
> an in-depth discussion.
> 
> Some advantages to this approach are:
> 
> - the server can easily verify what is being signed
> - the client can include additional parameters in the signed message
> - the request remains valid even if changed by proxies or other
> intermediaries
> 
> Some disadvantages are:
> 
> - the request is sent twice, once raw and once normalized
> - it adds another place to make mistakes and create security holes if the
> server uses the raw data without fully comparing it to the normalized
> (signed) data
> - since any server enforcing security will only use the data contained in
> the normalized portion, it will create a de-facto standard for API requests
> (not nearly as heavy as SOAP or WS-*) in which case the request itself is
> normalized before sending.
> 
> QUESTIONS: How do people feel about this? What are some other advantaged and
> disadvantages of this approach?

-1 to including a normalized version of the request with the request.

As you point-out, it's tantamount to including the body of request in
the payload and treating HTTP—a transfer protocol—as a transport layer,
ignoring the majority of the features HTTP offers.

I'm inclined to bite the bullet and profile the flexible Eaton style (C)
signing token format such that different HTTP elements can be
enumerated, and such can be used to establish a normalized structure for
signing/verification.

> 
> 
> EHL
> 
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Paul


From eve@xmlgrrl.com  Thu Jan 14 14:46:12 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 094F13A6A00 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:46:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.708
X-Spam-Level: *
X-Spam-Status: No, score=1.708 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2Wk+N2-xYxwH for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:46:11 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id 1F7BF3A69FF for <oauth@ietf.org>; Thu, 14 Jan 2010 14:46:11 -0800 (PST)
Received: from [192.168.168.198] (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o0EMjg17019662 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 14 Jan 2010 14:46:06 -0800
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <4B4F7628.9030709@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 14:45:41 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>	<d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com> <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net> <4B4F7628.9030709@alcatel-lucent.com>
To: faynberg@alcatel-lucent.com
X-Mailer: Apple Mail (2.1077)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 22:46:12 -0000

What's generally done today (think Google Calendar, Flickr, etc.) is use =
"private" URLs and mail them around.  It doesn't really meet anyone's =
standards for controlling access to anything valuable -- but it sure is =
convenient. :-)

	Eve

On 14 Jan 2010, at 11:53 AM, Igor Faynberg wrote:

> John Kemp wrote:
>> ...
>> What delegated authorization protocol should be used to deal with =
those "not so serious" use-cases then, if OAuth makes them too =
expensive?
>>=20
>> =20
> I expected this question and dreaded it.  I don't have a good answer, =
and I don't think there is one. (In my defense, the airport security =
cannot find the way around the =
wait-wait-wait/shoes-off/belts-off/watches-off routine for "good" =
people--who are actually the majority.)
>=20
> One not-so-good answer, but--I think--a workable one is to consider an =
(enumerated type) parameter carrying a required security value, =
something that would have to come from the user initially, and then =
specify TLS or any other cryptographic delicacy based on such value. The =
only problem is that end users might happily settle for the highest =
security, anyway (unless they have to pay for it).
>=20
> Igor

Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog


From email@pbryan.net  Thu Jan 14 14:53:15 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B2F453A6890 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:53:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.216
X-Spam-Level: 
X-Spam-Status: No, score=-2.216 tagged_above=-999 required=5 tests=[AWL=0.383,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TmlnTNk2IxAQ for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 14:53:15 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id E914B3A6838 for <oauth@ietf.org>; Thu, 14 Jan 2010 14:53:14 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id ED8DCEA022 for <oauth@ietf.org>; Thu, 14 Jan 2010 22:53:11 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <C773F42D.2D07C%eran@hueniverse.com>
References: <C773F42D.2D07C%eran@hueniverse.com>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 14 Jan 2010 14:53:07 -0800
Message-ID: <1263509587.25688.19.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 8bit
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 22:53:15 -0000

On Wed, 2010-01-13 at 23:05 -0700, Eran Hammer-Lahav wrote:
> Authentication Open Question #3: Should require using TLS/SSL/secure channel
> for any request made without a signature?
> 
> WRAP got a lot of attention (mostly negative) to how it sends requests
> without using signatures or a secure channel. WRAP only uses HTTPS for
> obtaining tokens but does not mandate (or even suggests) using HTTPS for
> making protected resources requests. Instead, WRAP recommends short lived
> tokens that must be refreshed (using HTTPS).
> 
> In a recent thread [1] on this list we reach (very small) consensus that the
> OAuth 1.0 protocol should mandate HTTPS for the PLAINTEXT method. The
> community edition only recommends it.
> 
> QUESTIONS: Are there any valid (such that will pass IETF security review
> scrutiny) reasons for allowing unsigned requests to be sent in the clear
> over an insecure channel? Are there use cases for this (regardless of their
> security properties)?

Yes, two machines on a network that is internal and presumed secure, and
that doesn't need—or want!—the overhead of using point-to-point
transport layer security.

As has been pointed-out on this thread, the decision to use a secure
channel, and to what extent it is made secure, are dependent on the
threat model: the sensitivity of the data, the extent to which it is
exposed, and the threat of its exposure.

I don't think the OAuth protocol specification should mandate (a la
MUST) transport security. At best, recommendations (a la SHOULD) would
be more appropriate, giving discretion to those designing and deploying.

> 
> EHL
> 
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00951.html
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

Paul


From jpanzer@google.com  Thu Jan 14 15:28:15 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 48B353A68DA for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 15:28:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.574
X-Spam-Level: 
X-Spam-Status: No, score=-105.574 tagged_above=-999 required=5 tests=[AWL=-0.403, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W3zzCy1PwSRx for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 15:28:14 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id B7A233A6891 for <oauth@ietf.org>; Thu, 14 Jan 2010 15:28:13 -0800 (PST)
Received: from kpbe12.cbf.corp.google.com (kpbe12.cbf.corp.google.com [172.25.105.76]) by smtp-out.google.com with ESMTP id o0ENS8sL005102 for <oauth@ietf.org>; Thu, 14 Jan 2010 23:28:09 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263511689; bh=ISR+HZJwVPqW01COU6SaO8ruJWU=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=DXEGw7UOt1rdMMSNsMczjKtjaJFy7sp26N4G5TL50gBZvd9CF99WK3AP7D0JbkihE /XmEzpnT/lbHrsKGPLggQ==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:content-transfer-encoding:x-system-of-record; b=jJ5gQKRAird706UHtBJBmWVhKEG+QvkS5bqtM2CiH9vkXKABrWXAGWzNI4BHCeA71 /nlKewcgBfr9aUisvTsYA==
Received: from pzk41 (pzk41.prod.google.com [10.243.19.169]) by kpbe12.cbf.corp.google.com with ESMTP id o0ENRXdj001343 for <oauth@ietf.org>; Thu, 14 Jan 2010 15:28:07 -0800
Received: by pzk41 with SMTP id 41so162476pzk.0 for <oauth@ietf.org>; Thu, 14 Jan 2010 15:28:07 -0800 (PST)
MIME-Version: 1.0
Received: by 10.115.133.8 with SMTP id k8mr1061170wan.39.1263511687151; Thu,  14 Jan 2010 15:28:07 -0800 (PST)
In-Reply-To: <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com> <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net> <4B4F7628.9030709@alcatel-lucent.com> <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
Date: Thu, 14 Jan 2010 15:28:07 -0800
Message-ID: <cb5f7a381001141528x3ef8afe5qc2afab404e11f4b2@mail.gmail.com>
From: John Panzer <jpanzer@google.com>
To: Eve Maler <eve@xmlgrrl.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 23:28:15 -0000

And to build such a secret url, a WRAP token as a query param in the
url would be sufficient.

On Thursday, January 14, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
> What's generally done today (think Google Calendar, Flickr, etc.) is use =
"private" URLs and mail them around. =A0It doesn't really meet anyone's sta=
ndards for controlling access to anything valuable -- but it sure is conven=
ient. :-)
>
>  =A0 =A0 =A0 =A0Eve
>
> On 14 Jan 2010, at 11:53 AM, Igor Faynberg wrote:
>
>> John Kemp wrote:
>>> ...
>>> What delegated authorization protocol should be used to deal with those=
 "not so serious" use-cases then, if OAuth makes them too expensive?
>>>
>>>
>> I expected this question and dreaded it. =A0I don't have a good answer, =
and I don't think there is one. (In my defense, the airport security cannot=
 find the way around the wait-wait-wait/shoes-off/belts-off/watches-off rou=
tine for "good" people--who are actually the majority.)
>>
>> One not-so-good answer, but--I think--a workable one is to consider an (=
enumerated type) parameter carrying a required security value, something th=
at would have to come from the user initially, and then specify TLS or any =
other cryptographic delicacy based on such value. The only problem is that =
end users might happily settle for the highest security, anyway (unless the=
y have to pay for it).
>>
>> Igor
>
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--=20
--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer

From faynberg@alcatel-lucent.com  Thu Jan 14 15:43:29 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2EEE63A68DA for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 15:43:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.396
X-Spam-Level: 
X-Spam-Status: No, score=-2.396 tagged_above=-999 required=5 tests=[AWL=-0.603, BAYES_00=-2.599, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Aj6UpMp3tJ5J for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 15:43:28 -0800 (PST)
Received: from ihemail4.lucent.com (ihemail4.lucent.com [135.245.0.39]) by core3.amsl.com (Postfix) with ESMTP id 157C93A67AA for <oauth@ietf.org>; Thu, 14 Jan 2010 15:43:28 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail4.lucent.com (8.13.8/IER-o) with ESMTP id o0ENhLwA026963 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 14 Jan 2010 17:43:21 -0600 (CST)
Received: from [135.244.24.239] (faynberg.lra.lucent.com [135.244.24.239]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0ENhKLb010875; Thu, 14 Jan 2010 17:43:20 -0600 (CST)
Message-ID: <4B4FAC1B.7000105@alcatel-lucent.com>
Date: Thu, 14 Jan 2010 18:43:23 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Eve Maler <eve@xmlgrrl.com>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>	<d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com> <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net> <4B4F7628.9030709@alcatel-lucent.com> <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
In-Reply-To: <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.39
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jan 2010 23:43:29 -0000

Actually, this makes a lot of sense. I believe that such URLs can be 
made sufficiently secure by signing with a key bootstrapped from the 
password (something like PAK or EKE). But they ought to remain secret, 
which is  pretty impossible  to ensure, or they must be made unreusable 
by anyone except the intended party.  I guess one way is to build the 
delegation into the URL by providing the recognizable identity string 
(like OpenId) on which the recipient will need to authenticate.

One question: how would that fit into the present OAuth plan? Could we 
standardize the delegation URL?

Igor

P.S.: I just wanted to clarify that I see the promise in OAuth to be 
used in  far more sensitive settings. For instance, I would consider 
delegation (to an insurance agent)  to access medical data or another 
private record.  There is also an interesting proposal from Deutche 
Telecom, related to SIP, already on the table.

This is why I am  a proponent of a general secure solution as a default.

Eve Maler wrote:
> What's generally done today (think Google Calendar, Flickr, etc.) is use "private" URLs and mail them around.  It doesn't really meet anyone's standards for controlling access to anything valuable -- but it sure is convenient. :-)
>
> 	Eve
>
> On 14 Jan 2010, at 11:53 AM, Igor Faynberg wrote:
>
>   
>> John Kemp wrote:
>>     
>>> ...
>>> What delegated authorization protocol should be used to deal with those "not so serious" use-cases then, if OAuth makes them too expensive?
>>>
>>>  
>>>       
>> I expected this question and dreaded it.  I don't have a good answer, and I don't think there is one. (In my defense, the airport security cannot find the way around the wait-wait-wait/shoes-off/belts-off/watches-off routine for "good" people--who are actually the majority.)
>>
>> One not-so-good answer, but--I think--a workable one is to consider an (enumerated type) parameter carrying a required security value, something that would have to come from the user initially, and then specify TLS or any other cryptographic delicacy based on such value. The only problem is that end users might happily settle for the highest security, anyway (unless they have to pay for it).
>>
>> Igor
>>     
>
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
>
>   


Eve Maler wrote:
> What's generally done today (think Google Calendar, Flickr, etc.) is use "private" URLs and mail them around.  It doesn't really meet anyone's standards for controlling access to anything valuable -- but it sure is convenient. :-)
>
> 	Eve
>
> On 14 Jan 2010, at 11:53 AM, Igor Faynberg wrote:
>
>   
>> John Kemp wrote:
>>     
>>> ...
>>> What delegated authorization protocol should be used to deal with those "not so serious" use-cases then, if OAuth makes them too expensive?
>>>
>>>  
>>>       
>> I expected this question and dreaded it.  I don't have a good answer, and I don't think there is one. (In my defense, the airport security cannot find the way around the wait-wait-wait/shoes-off/belts-off/watches-off routine for "good" people--who are actually the majority.)
>>
>> One not-so-good answer, but--I think--a workable one is to consider an (enumerated type) parameter carrying a required security value, something that would have to come from the user initially, and then specify TLS or any other cryptographic delicacy based on such value. The only problem is that end users might happily settle for the highest security, anyway (unless they have to pay for it).
>>
>> Igor
>>     
>
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
>
>   


From rbarnes@bbn.com  Thu Jan 14 16:39:36 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EF85B3A67AA for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 16:39:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ctXH0zdjCJtX for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 16:39:35 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by core3.amsl.com (Postfix) with ESMTP id BAE933A67EA for <oauth@ietf.org>; Thu, 14 Jan 2010 16:39:35 -0800 (PST)
Received: from [128.89.253.32] (helo=[192.168.1.45]) by smtp.bbn.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <rbarnes@bbn.com>) id 1NVaDr-000OcG-Bm; Thu, 14 Jan 2010 19:39:32 -0500
Message-Id: <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Blaine Cook <romeda@gmail.com>
In-Reply-To: <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-5--406554938
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 14 Jan 2010 19:39:30 -0500
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 00:39:37 -0000

--Apple-Mail-5--406554938
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit

> As such, I can't see how *not* requiring SSL for unsigned requests
> could pass muster at an IETF security review.

Speaking as someone who does IETF security reviews ...  :)

If I were reviewing a document that defines an optional insecure mode  
of operation (in this case, operating without TLS), I would be looking  
for basically two things: (1) A discussion of the risks if the  
insecure mode is used, and (2) a motivation for why these risks might  
be acceptable in certain cases.  This is in the spirit of "MUST=SHOULD 
+exception" -- if it's a SHOULD, you need to explain the exception.   
In this case, the risks (1) are pretty obvious: A passive observer can  
steal your password and use it to authenticate as you.  The  
motivations (2) are what this thread is about.

I would also observe that "MUST use TLS or equivalent" is actually the  
same as "SHOULD use TLS", since the "or equivalent" isn't really  
specified.  (This is really obvious when you think about it from the  
perspective of an implementor: If you're going to cover the "or  
equivalent" cases, then you have to have be able to operate in non-TLS  
mode.)  The "or equivalent" cases are the ones where not using TLS  
might be acceptable, i.e., the ones that should be cited as  
motivations (2) for allowing the non-secure mode.

Taking the SECDIR hat off, it seems to me that there are some  
motivations appearing in this thread:
-- Appropriate key management (frequent key refresh)
-- Private trusted networks
-- John's observation that "URL+token" == "private URL"
So ISTM that "SHOULD use TLS" could be motivated here.

(Now, all that said, it probably wouldn't hurt to have TLS as a "MUST  
implement" so that it's there if people want to use it.)

--Richard




> 2010/1/14 John Kemp <john@jkemp.net>:
>>
>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>
>> [...]
>>>
>>> QUESTIONS: Are there any valid (such that will pass IETF security  
>>> review
>>> scrutiny) reasons for allowing unsigned requests to be sent in the  
>>> clear
>>> over an insecure channel? Are there use cases for this (regardless  
>>> of their
>>> security properties)?
>>
>> I am still wavering on this.
>>
>> I think that using a bearer token with short lifetime and one-time  
>> use semantics (for example) is probably sufficient security for  
>> many use-cases. And using TLS/SSL (or even just signing and  
>> verifying a signed request) in all cases may provide too much  
>> performance overhead for some of those cases.
>>
>> In other words, I think that it's not only channel security we need  
>> to consider, but a combination of other measures that would, in  
>> some cases, obviate the need for TLS.
>>
>> Regards,
>>
>> - johnk
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-5--406554938
Content-Type: text/html;
	charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><div><blockquote =
type=3D"cite"><div>As such, I can't see how *not* requiring SSL for =
unsigned requests<br>could pass muster at an IETF security review.<font =
class=3D"Apple-style-span" color=3D"#000000"><font =
class=3D"Apple-style-span" =
color=3D"#144FAE"><br></font></font></div></blockquote><div><br></div><div=
>Speaking as someone who does IETF security reviews ... =
&nbsp;:)</div><div><br></div><div>If I were reviewing a document that =
defines an optional insecure mode of operation (in this case, operating =
without TLS), I would be looking for basically two things: (1) A =
discussion of the risks if the insecure mode is used, and (2) a =
motivation for why these risks might be acceptable in certain cases. =
&nbsp;This is in the spirit of "MUST=3DSHOULD+exception" -- if it's a =
SHOULD, you need to explain the exception. &nbsp;In this case, the risks =
(1) are pretty obvious: A passive observer can steal your password and =
use it to authenticate as you. &nbsp;The motivations (2) are what this =
thread is about.</div><div><br></div><div>I would also observe that =
"MUST use TLS or equivalent" is actually the same as "SHOULD use TLS", =
since the "or equivalent" isn't really specified. &nbsp;(This is really =
obvious when you think about it from the perspective of an implementor: =
If you're going to cover the "or equivalent" cases, then you have to =
have be able to operate in non-TLS mode.) &nbsp;The "or equivalent" =
cases are the ones where not using TLS might be acceptable, i.e., the =
ones that should be cited as motivations (2) for allowing the non-secure =
mode. &nbsp;</div><div><br></div><div>Taking the SECDIR hat off, it =
seems to me that there are some motivations appearing in this =
thread:</div><div>-- Appropriate key management (frequent key =
refresh)</div><div>-- Private trusted networks</div><div>-- John's =
observation that "URL+token" =3D=3D "private URL"</div><div>So ISTM that =
"SHOULD use TLS" could be motivated here.</div><div><br></div><div>(Now, =
all that said, it probably wouldn't hurt to have TLS as a "MUST =
implement" so that it's there if people want to use =
it.)</div><div><br></div><div>--Richard</div><div><br></div><div><br></div=
><div><br></div><br><blockquote type=3D"cite"><div>2010/1/14 John Kemp =
&lt;<a =
href=3D"mailto:john@jkemp.net">john@jkemp.net</a>&gt;:<br><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">On Jan 14, =
2010, at 1:05 AM, Eran Hammer-Lahav wrote:<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite">[...]<br></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite"><br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">QUESTIONS: Are there any valid =
(such that will pass IETF security =
review<br></blockquote></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite">scrutiny) reasons for allowing unsigned requests to be =
sent in the clear<br></blockquote></blockquote><blockquote =
type=3D"cite"><blockquote type=3D"cite">over an insecure channel? Are =
there use cases for this (regardless of =
their<br></blockquote></blockquote><blockquote type=3D"cite"><blockquote =
type=3D"cite">security =
properties)?<br></blockquote></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">I am still =
wavering on this.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">I think that =
using a bearer token with short lifetime and one-time use semantics (for =
example) is probably sufficient security for many use-cases. And using =
TLS/SSL (or even just signing and verifying a signed request) in all =
cases may provide too much performance overhead for some of those =
cases.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">In other words, =
I think that it's not only channel security we need to consider, but a =
combination of other measures that would, in some cases, obviate the =
need for TLS.<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite">Regards,<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote type=3D"cite">- =
johnk<br></blockquote><blockquote =
type=3D"cite"><br></blockquote><blockquote =
type=3D"cite">_______________________________________________<br></blockqu=
ote><blockquote type=3D"cite">OAuth mailing =
list<br></blockquote><blockquote type=3D"cite"><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br></blockquote><blockqu=
ote type=3D"cite"><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br></blockquote><blockquote =
type=3D"cite"><br></blockquote>___________________________________________=
____<br>OAuth mailing list<br><a =
href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>https://www.ietf.org/=
mailman/listinfo/oauth<br></div></blockquote></div><br></body></html>=

--Apple-Mail-5--406554938--

From john@jkemp.net  Thu Jan 14 16:46:58 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 767653A6886 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 16:46:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.862
X-Spam-Level: 
X-Spam-Status: No, score=-1.862 tagged_above=-999 required=5 tests=[AWL=-0.403, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UlY4ZHf5he+t for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 16:46:57 -0800 (PST)
Received: from outbound-mail-313.bluehost.com (outbound-mail-313.bluehost.com [67.222.54.6]) by core3.amsl.com (Postfix) with SMTP id 687D73A6878 for <oauth@ietf.org>; Thu, 14 Jan 2010 16:46:57 -0800 (PST)
Received: (qmail 31720 invoked by uid 0); 15 Jan 2010 00:46:54 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy6.bluehost.com with SMTP; 15 Jan 2010 00:46:54 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=SH7kUpXcvevHkTcckzAdIpPmTTWsU5hOO+qTxl+t8cR3mb+n+m46HzTJGJFd0+NS07Jv+BE0IfXRZ1F6Iq/o8VXN+DaR4/jGVG5P7gxtiTUJwb1d2TgBMe6VPpo9inHp;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVaL0-0003S4-6a; Thu, 14 Jan 2010 17:46:54 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
Date: Thu, 14 Jan 2010 19:46:52 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <67ED0616-7C0E-4FDF-AC7F-239ED7A2AC89@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com>	<5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>	<d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net> <4B4F6D5A.8010604@alcatel-lucent.com> <E9A35D3D-B833-47F1-9100-C63737563B1E@jkemp.net> <4B4F7628.9030709@alcatel-lucent.com> <1CE9A726-03D8-404A-AF80-7CFFD86826BF@xmlgrrl.com>
To: Eve Maler <eve@xmlgrrl.com>
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 00:46:58 -0000

On Jan 14, 2010, at 5:45 PM, Eve Maler wrote:

> What's generally done today (think Google Calendar, Flickr, etc.) is =
use "private" URLs and mail them around.  It doesn't really meet =
anyone's standards for controlling access to anything valuable -- but it =
sure is convenient. :-)

Right, so the URL itself is a bearer token, perhaps with usage =
limitations, like a limited timeframe when you get a 200 response from =
dereferencing the URL ;)

- johnk
=20
>=20
> 	Eve
>=20
> On 14 Jan 2010, at 11:53 AM, Igor Faynberg wrote:
>=20
>> John Kemp wrote:
>>> ...
>>> What delegated authorization protocol should be used to deal with =
those "not so serious" use-cases then, if OAuth makes them too =
expensive?
>>>=20
>>>=20
>> I expected this question and dreaded it.  I don't have a good answer, =
and I don't think there is one. (In my defense, the airport security =
cannot find the way around the =
wait-wait-wait/shoes-off/belts-off/watches-off routine for "good" =
people--who are actually the majority.)
>>=20
>> One not-so-good answer, but--I think--a workable one is to consider =
an (enumerated type) parameter carrying a required security value, =
something that would have to come from the user initially, and then =
specify TLS or any other cryptographic delicacy based on such value. The =
only problem is that end users might happily settle for the highest =
security, anyway (unless they have to pay for it).
>>=20
>> Igor
>=20
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
>=20


From eran@hueniverse.com  Thu Jan 14 20:41:29 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E4F313A68B6 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 20:41:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.448
X-Spam-Level: 
X-Spam-Status: No, score=-2.448 tagged_above=-999 required=5 tests=[AWL=0.151,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2USGBbhtknwl for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 20:41:28 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id AF1B03A659B for <oauth@ietf.org>; Thu, 14 Jan 2010 20:41:28 -0800 (PST)
Received: (qmail 16966 invoked from network); 15 Jan 2010 04:41:26 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 15 Jan 2010 04:41:25 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 14 Jan 2010 21:41:25 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: John Kemp <john@jkemp.net>, Blaine Cook <romeda@gmail.com>
Date: Thu, 14 Jan 2010 21:41:21 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqVIdatqQ4PZUDgS02HmrhpXlQCKwAeyVmW
Message-ID: <C77531F1.2D114%eran@hueniverse.com>
In-Reply-To: <D713DE81-48C8-46A9-978B-C7DB77DBB9AA@jkemp.net>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 04:41:30 -0000

(this is not aimed at John Kemp)

I understand that some providers will not want to bother with the extra
security for their own reasons. I am willing to assume they are doing this
fully aware of the repercussions of their actions. What I don't understand
is why should the protocol - which is aimed at interoperability - bother
with it?

We got people here representing many companies, large and small. Can one of
them please raise their hand and ask for this feature? And if they do, can
they explain how they justify providing poor security to their users?

I am no longer interested in the argument that somewhere there are valid us=
e
cases. Writing a protocol for scenarios that are not anchored in reality is
bad. OAuth 1.0 does not require using a secure channel for sending token
secrets because people claimed it will be a problem for some providers. So
far, no such providers showed up.

If someone want to argue the need of no-crypto / no-HTTPS, while showing ho=
w
that need justifies subjecting the web to more bad protocols and poor
foresight, I am eager to listen.

If you don't care about security, you are free to implement the protocol
poorly. There is no OAuth Police to enforce servers to check signature and
reject requests with bad ones. At least by forcing such cases to break the
protocol, we are forcing them to make an active decision and we get their
API users to notice.

There is also a case to be made about pushing the envelope when it comes to
security. The more services use TLS, the cheaper and easier it will get.
That's economics 101. And unlike writing new code for new OAuth signatures,
requiring TLS will simply mean linking another library and making a functio=
n
call.

My vote is to start with an HTTPS requirement for any unsigned request, and
let those who have real reasons to object show up. None of the current user=
s
of OAuth 1.0 will be able to claim this since they all use HTTPS for all
such requests.

EHL


On 1/14/10 5:59 AM, "John Kemp" <john@jkemp.net> wrote:

> Hi Blaine,
>=20
> On Jan 14, 2010, at 7:10 AM, Blaine Cook wrote:
>=20
>> OAuth WRAP is very similar to cookies as deployed by major vendors.
>=20
> How is that relevant to _this_ discussion (I apologize, I don't know much
> about WRAP)?
>=20
>>=20
>> Google has just switched to HTTPS-by-default for all GMail
>> sessions[1],
>=20
> Yes, HTTPS by default, and they are doing it in order to secure the excha=
nge
> of email - allowing emails to remain confidential on insecure networks. I
> think that is a strong use-case for requiring confidentiality.
>=20
> But not all use-cases for OAuth need that much confidentiality, or any
> confidentiality at all.
>=20
>> and my understanding (per [2]) is that access to
>> authenticated sessions (i.e., full GMail or Google Docs access versus
>> just displaying "bob@gmail.com" on the page) is always negotiated with
>> a secure cookie. Thus, Google has made decisions internally to secure
>> the equivalent of both the Refresh and the Bearer token, short-lived
>> assurances aside.
>>=20
>> We're also entering an age where we have enough computing power to
>> *factor* RSA-1024 in non-infinite-time; handheld devices that are
>> realistically expected to use these protocols have sufficient
>> computing power and battery life to encrypt HTTP requests and decrypt
>> the responses (my phone already does this for all Twitter and email
>> requests; yours probably does, too).
>=20
> I guess my concern about performance is more at the server-side, where ma=
ny
> requests may be processed more or less simultaneously. Back in the old da=
ys
> (1997) we had a special crypto hardware accelerator in our Internet-conne=
cted
> proxies, and our non-Internet connected machines wouldn't use SSL at all,
> because of the performance impact.
>=20
> I'm sure things are better these days, but crypto operations still add
> performance overhead that may not in practice be necessary for every use-=
case.
>=20
>>=20
>> As such, I can't see how *not* requiring SSL for unsigned requests
>> could pass muster at an IETF security review.
>=20
> Well, I don't know what is required to pass IETF security review, and per=
haps
> you're right, but the point is really whether there are cases where a
> combination of short-lifespan + replay-prevention and possibly other
> non-transport things could provide enough security to allow people to per=
form
> real work with OAuth tokens.
>=20
> And I think there are such cases - rather vaguely I could say that the br=
oad
> category would be anything for which a large volume of authorized request=
s is
> possible, and where the "value" in an individual request is low. That
> certainly does not include email, which I rather think _is_ deserving of
> confidentiality over insecure networks (of course, Gmail does allow you t=
o
> turn off https if you are in a more secure network environment).
>=20
> Regards,
>=20
> - johnk
>=20
>>=20
>> [1] http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail=
.html
>> [2]=20
>> http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web-=
appli
>> cations.html
>>=20
>> 2010/1/14 John Kemp <john@jkemp.net>:
>>>=20
>>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>>=20
>>> [...]
>>>>=20
>>>> QUESTIONS: Are there any valid (such that will pass IETF security revi=
ew
>>>> scrutiny) reasons for allowing unsigned requests to be sent in the cle=
ar
>>>> over an insecure channel? Are there use cases for this (regardless of =
their
>>>> security properties)?
>>>=20
>>> I am still wavering on this.
>>>=20
>>> I think that using a bearer token with short lifetime and one-time use
>>> semantics (for example) is probably sufficient security for many use-ca=
ses.
>>> And using TLS/SSL (or even just signing and verifying a signed request)=
 in
>>> all cases may provide too much performance overhead for some of those c=
ases.
>>>=20
>>> In other words, I think that it's not only channel security we need to
>>> consider, but a combination of other measures that would, in some cases=
,
>>> obviate the need for TLS.
>>>=20
>>> Regards,
>>>=20
>>> - johnk
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>=20


From stpeter@stpeter.im  Thu Jan 14 20:45:56 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E2EB53A68D0 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 20:45:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2728OhwaM5D8 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 20:45:55 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 84E8E3A68B6 for <oauth@ietf.org>; Thu, 14 Jan 2010 20:45:55 -0800 (PST)
Received: from leavealone.cisco.com (72-163-0-129.cisco.com [72.163.0.129]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id B53F940D1C for <oauth@ietf.org>; Thu, 14 Jan 2010 21:45:51 -0700 (MST)
Message-ID: <4B4FF2FB.80000@stpeter.im>
Date: Thu, 14 Jan 2010 21:45:47 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: oauth@ietf.org
References: <C77531F1.2D114%eran@hueniverse.com>
In-Reply-To: <C77531F1.2D114%eran@hueniverse.com>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms020902020708030704010304"
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 04:45:57 -0000

This is a cryptographically signed message in MIME format.

--------------ms020902020708030704010304
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

+1. Obtaining a certificate is far from an onerous requirement...

On 1/14/10 9:41 PM, Eran Hammer-Lahav wrote:
> (this is not aimed at John Kemp)
>=20
> I understand that some providers will not want to bother with the extra=

> security for their own reasons. I am willing to assume they are doing t=
his
> fully aware of the repercussions of their actions. What I don't underst=
and
> is why should the protocol - which is aimed at interoperability - bothe=
r
> with it?
>=20
> We got people here representing many companies, large and small. Can on=
e of
> them please raise their hand and ask for this feature? And if they do, =
can
> they explain how they justify providing poor security to their users?
>=20
> I am no longer interested in the argument that somewhere there are vali=
d use
> cases. Writing a protocol for scenarios that are not anchored in realit=
y is
> bad. OAuth 1.0 does not require using a secure channel for sending toke=
n
> secrets because people claimed it will be a problem for some providers.=
 So
> far, no such providers showed up.
>=20
> If someone want to argue the need of no-crypto / no-HTTPS, while showin=
g how
> that need justifies subjecting the web to more bad protocols and poor
> foresight, I am eager to listen.
>=20
> If you don't care about security, you are free to implement the protoco=
l
> poorly. There is no OAuth Police to enforce servers to check signature =
and
> reject requests with bad ones. At least by forcing such cases to break =
the
> protocol, we are forcing them to make an active decision and we get the=
ir
> API users to notice.
>=20
> There is also a case to be made about pushing the envelope when it come=
s to
> security. The more services use TLS, the cheaper and easier it will get=
=2E
> That's economics 101. And unlike writing new code for new OAuth signatu=
res,
> requiring TLS will simply mean linking another library and making a fun=
ction
> call.
>=20
> My vote is to start with an HTTPS requirement for any unsigned request,=
 and
> let those who have real reasons to object show up. None of the current =
users
> of OAuth 1.0 will be able to claim this since they all use HTTPS for al=
l
> such requests.
>=20
> EHL
>=20
>=20
> On 1/14/10 5:59 AM, "John Kemp" <john@jkemp.net> wrote:
>=20
>> Hi Blaine,
>>
>> On Jan 14, 2010, at 7:10 AM, Blaine Cook wrote:
>>
>>> OAuth WRAP is very similar to cookies as deployed by major vendors.
>>
>> How is that relevant to _this_ discussion (I apologize, I don't know m=
uch
>> about WRAP)?
>>
>>>
>>> Google has just switched to HTTPS-by-default for all GMail
>>> sessions[1],
>>
>> Yes, HTTPS by default, and they are doing it in order to secure the ex=
change
>> of email - allowing emails to remain confidential on insecure networks=
=2E I
>> think that is a strong use-case for requiring confidentiality.
>>
>> But not all use-cases for OAuth need that much confidentiality, or any=

>> confidentiality at all.
>>
>>> and my understanding (per [2]) is that access to
>>> authenticated sessions (i.e., full GMail or Google Docs access versus=

>>> just displaying "bob@gmail.com" on the page) is always negotiated wit=
h
>>> a secure cookie. Thus, Google has made decisions internally to secure=

>>> the equivalent of both the Refresh and the Bearer token, short-lived
>>> assurances aside.
>>>
>>> We're also entering an age where we have enough computing power to
>>> *factor* RSA-1024 in non-infinite-time; handheld devices that are
>>> realistically expected to use these protocols have sufficient
>>> computing power and battery life to encrypt HTTP requests and decrypt=

>>> the responses (my phone already does this for all Twitter and email
>>> requests; yours probably does, too).
>>
>> I guess my concern about performance is more at the server-side, where=
 many
>> requests may be processed more or less simultaneously. Back in the old=
 days
>> (1997) we had a special crypto hardware accelerator in our Internet-co=
nnected
>> proxies, and our non-Internet connected machines wouldn't use SSL at a=
ll,
>> because of the performance impact.
>>
>> I'm sure things are better these days, but crypto operations still add=

>> performance overhead that may not in practice be necessary for every u=
se-case.
>>
>>>
>>> As such, I can't see how *not* requiring SSL for unsigned requests
>>> could pass muster at an IETF security review.
>>
>> Well, I don't know what is required to pass IETF security review, and =
perhaps
>> you're right, but the point is really whether there are cases where a
>> combination of short-lifespan + replay-prevention and possibly other
>> non-transport things could provide enough security to allow people to =
perform
>> real work with OAuth tokens.
>>
>> And I think there are such cases - rather vaguely I could say that the=
 broad
>> category would be anything for which a large volume of authorized requ=
ests is
>> possible, and where the "value" in an individual request is low. That
>> certainly does not include email, which I rather think _is_ deserving =
of
>> confidentiality over insecure networks (of course, Gmail does allow yo=
u to
>> turn off https if you are in a more secure network environment).
>>
>> Regards,
>>
>> - johnk
>>
>>>
>>> [1] http://gmailblog.blogspot.com/2010/01/default-https-access-for-gm=
ail.html
>>> [2]=20
>>> http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-w=
eb-appli
>>> cations.html
>>>
>>> 2010/1/14 John Kemp <john@jkemp.net>:
>>>>
>>>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>>>
>>>> [...]
>>>>>
>>>>> QUESTIONS: Are there any valid (such that will pass IETF security r=
eview
>>>>> scrutiny) reasons for allowing unsigned requests to be sent in the =
clear
>>>>> over an insecure channel? Are there use cases for this (regardless =
of their
>>>>> security properties)?
>>>>
>>>> I am still wavering on this.
>>>>
>>>> I think that using a bearer token with short lifetime and one-time u=
se
>>>> semantics (for example) is probably sufficient security for many use=
-cases.
>>>> And using TLS/SSL (or even just signing and verifying a signed reque=
st) in
>>>> all cases may provide too much performance overhead for some of thos=
e cases.
>>>>
>>>> In other words, I think that it's not only channel security we need =
to
>>>> consider, but a combination of other measures that would, in some ca=
ses,
>>>> obviate the need for TLS.
>>>>
>>>> Regards,
>>>>
>>>> - johnk
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>


--------------ms020902020708030704010304
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms020902020708030704010304--

From eran@hueniverse.com  Thu Jan 14 20:48:12 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 354943A659B for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 20:48:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.465
X-Spam-Level: 
X-Spam-Status: No, score=-2.465 tagged_above=-999 required=5 tests=[AWL=0.134,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fOx1WGyZxC0V for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 20:48:11 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 23CB83A68D0 for <oauth@ietf.org>; Thu, 14 Jan 2010 20:48:11 -0800 (PST)
Received: (qmail 17933 invoked from network); 15 Jan 2010 04:48:08 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 15 Jan 2010 04:48:08 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 14 Jan 2010 21:48:08 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Richard Barnes <rbarnes@bbn.com>, Blaine Cook <romeda@gmail.com>
Date: Thu, 14 Jan 2010 21:48:05 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqVe0tJLGl/2PerRQSE41vZVIARNgAIqGVy
Message-ID: <C7753385.2D119%eran@hueniverse.com>
In-Reply-To: <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 04:48:12 -0000

Doesn't the fact that this approach has clearly failed for HTTP Basic act a=
s
a warning sign? 2617 clearly states the problems in using Basic over
insecure channels, and yet, given its simplicity, it is one of the most
widely used and abused protocol around.

I think this is a case where security and interoperability must be
considered as a pair. We know what makes a more secure protocol. How does
making it less secure by not making HTTPS required improve interoperability=
?
If it doesn't, there is no justification other than to make bad security
easier to excuse.

EHL


On 1/14/10 4:39 PM, "Richard Barnes" <rbarnes@bbn.com> wrote:

>> As such, I can't see how *not* requiring SSL for unsigned requests
>> could pass muster at an IETF security review.
>=20
> Speaking as someone who does IETF security reviews ...  :)
>=20
> If I were reviewing a document that defines an optional insecure mode of
> operation (in this case, operating without TLS), I would be looking for
> basically two things: (1) A discussion of the risks if the insecure mode =
is
> used, and (2) a motivation for why these risks might be acceptable in cer=
tain
> cases.  This is in the spirit of "MUST=3DSHOULD+exception" -- if it's a S=
HOULD,
> you need to explain the exception.  In this case, the risks (1) are prett=
y
> obvious: A passive observer can steal your password and use it to authent=
icate
> as you.  The motivations (2) are what this thread is about.
>=20
> I would also observe that "MUST use TLS or equivalent" is actually the sa=
me as
> "SHOULD use TLS", since the "or equivalent" isn't really specified.  (Thi=
s is
> really obvious when you think about it from the perspective of an impleme=
ntor:
> If you're going to cover the "or equivalent" cases, then you have to have=
 be
> able to operate in non-TLS mode.)  The "or equivalent" cases are the ones
> where not using TLS might be acceptable, i.e., the ones that should be ci=
ted
> as motivations (2) for allowing the non-secure mode.
>=20
> Taking the SECDIR hat off, it seems to me that there are some motivations
> appearing in this thread:
> -- Appropriate key management (frequent key refresh)
> -- Private trusted networks
> -- John's observation that "URL+token" =3D=3D "private URL"
> So ISTM that "SHOULD use TLS" could be motivated here.
>=20
> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST
> implement" so that it's there if people want to use it.)
>=20
> --Richard
>=20
>=20
>=20
>=20
>> 2010/1/14 John Kemp <john@jkemp.net>:
>>>=20
>>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>>=20
>>> [...]
>>>>=20
>>>> QUESTIONS: Are there any valid (such that will pass IETF security revi=
ew
>>>> scrutiny) reasons for allowing unsigned requests to be sent in the cle=
ar
>>>> over an insecure channel? Are there use cases for this (regardless of =
their
>>>> security properties)?
>>>=20
>>> I am still wavering on this.
>>>=20
>>> I think that using a bearer token with short lifetime and one-time use
>>> semantics (for example) is probably sufficient security for many use-ca=
ses.
>>> And using TLS/SSL (or even just signing and verifying a signed request)=
 in
>>> all cases may provide too much performance overhead for some of those c=
ases.
>>>=20
>>> In other words, I think that it's not only channel security we need to
>>> consider, but a combination of other measures that would, in some cases=
,
>>> obviate the need for TLS.
>>>=20
>>> Regards,
>>>=20
>>> - johnk
>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20


From recordond@gmail.com  Thu Jan 14 21:07:50 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 164253A68E0 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 21:07:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.669
X-Spam-Level: 
X-Spam-Status: No, score=-1.669 tagged_above=-999 required=5 tests=[AWL=0.930,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cGn-+NInQ0L9 for <oauth@core3.amsl.com>; Thu, 14 Jan 2010 21:07:49 -0800 (PST)
Received: from mail-iw0-f195.google.com (mail-iw0-f195.google.com [209.85.223.195]) by core3.amsl.com (Postfix) with ESMTP id 2FF413A68DF for <oauth@ietf.org>; Thu, 14 Jan 2010 21:07:49 -0800 (PST)
Received: by iwn33 with SMTP id 33so319976iwn.29 for <oauth@ietf.org>; Thu, 14 Jan 2010 21:07:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=yv2ah06ByaXyS7jSB9ek8vfgEZ0Z4QJawxLw9q66yqY=; b=NYwSLrmtSAd6kiuiI/niv9mKg6XhVD1ZdsQuJBbPM5Ehqp+zdtiRj9DwIHJIbmPiZ2 SWZUbxnkUaa54m9v7Oxbb8OnOdJUkJG4dWm8X47ObQq3FaSXNONyqvRDBd1PSphUGrTu 4wst8LKs8w5gMCtDnCawQRjEJ7iwMW8T5KKms=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=s6wb0p4JSG8tZ+ROKKHJywqOQ7cd+RQi4zicWgroyl7aEV7B6YLdFCPFYdN2BFeYbb ibJydELPEg+w2l333Wrjm+T++cX373BbMnL8p5i6PBh+xbiyo+3tJHtNvf8T1UitWSFL CJ3gHfNhMZxCOshd4DrKJFbWOSMDB4dxkcBos=
MIME-Version: 1.0
Received: by 10.231.147.149 with SMTP id l21mr403228ibv.0.1263532063859; Thu,  14 Jan 2010 21:07:43 -0800 (PST)
In-Reply-To: <C773F42D.2D07C%eran@hueniverse.com>
References: <C773F42D.2D07C%eran@hueniverse.com>
Date: Thu, 14 Jan 2010 21:07:43 -0800
Message-ID: <fd6741651001142107h2fe182c0n2304217a553cc769@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 05:07:50 -0000

On Wed, Jan 13, 2010 at 10:05 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> Authentication Open Question #3: Should require using TLS/SSL/secure channel
> for any request made without a signature?

Yes.  Either TLS/SSL should be used or their should be an appropriate
signature.  I'll leave "secure channel" for others to define and argue
about. ;)


> WRAP got a lot of attention (mostly negative) to how it sends requests
> without using signatures or a secure channel. WRAP only uses HTTPS for
> obtaining tokens but does not mandate (or even suggests) using HTTPS for
> making protected resources requests. Instead, WRAP recommends short lived
> tokens that must be refreshed (using HTTPS).

Speaking as an implementor (Facebook hat) we always saw WRAP as using
HTTPS for making protected resources requests.  Every protocol drawing
we've drawn includes HTTPS on this step.  We can see offering some
APIs which work entirely with public data over HTTP, but in that case
the access token would be a poor choice and really just acts as a
consumer key for logging purposes.

That said, the JavaScript profile has very different security
characteristics than the other profiles when it comes to acquiring an
access token.  Access tokens acquired via this profile will be short
lived and have more restricted scopes than those acquired via other
(more secure) profiles.


> In a recent thread [1] on this list we reach (very small) consensus that the
> OAuth 1.0 protocol should mandate HTTPS for the PLAINTEXT method. The
> community edition only recommends it.
>
> QUESTIONS: Are there any valid (such that will pass IETF security review
> scrutiny) reasons for allowing unsigned requests to be sent in the clear
> over an insecure channel? Are there use cases for this (regardless of their
> security properties)?
>
> EHL
>
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00951.html
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From john@jkemp.net  Fri Jan 15 07:58:29 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 577DC3A6AFD for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 07:58:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.164
X-Spam-Level: 
X-Spam-Status: No, score=-2.164 tagged_above=-999 required=5 tests=[AWL=0.101,  BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S-MEsCdmUKpx for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 07:58:27 -0800 (PST)
Received: from outbound-mail-158.bluehost.com (outbound-mail-158.bluehost.com [67.222.39.38]) by core3.amsl.com (Postfix) with SMTP id AC73E3A6AE1 for <oauth@ietf.org>; Fri, 15 Jan 2010 07:58:27 -0800 (PST)
Received: (qmail 2304 invoked by uid 0); 15 Jan 2010 15:58:24 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy5.bluehost.com with SMTP; 15 Jan 2010 15:58:24 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=GhWptDOESwVyTtvO6SHTA/lZLzy4g+ZHhTAkRk4POy91ejSgo4Zhpk2Jao/haVI2jChNGQEooo6qr7xoP6mxo4YyMCHzEq42GZ6pbWlmHsBVuAc0bseOkWq/R0BOHsFe;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVoZ5-0001gC-Lu; Fri, 15 Jan 2010 08:58:24 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <C77531F1.2D114%eran@hueniverse.com>
Date: Fri, 15 Jan 2010 10:58:22 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <CF19B7F9-6C94-4728-8F25-64C25471523E@jkemp.net>
References: <C77531F1.2D114%eran@hueniverse.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 15:58:29 -0000

Hi Eran!

On Jan 14, 2010, at 11:41 PM, Eran Hammer-Lahav wrote:

> (this is not aimed at John Kemp)

I think you mean it's not _specifically_ aimed at me, but in any case, =
I'll take the opportunity to reply anyway ;)
=20
>=20
> I understand that some providers will not want to bother with the =
extra
> security for their own reasons. I am willing to assume they are doing =
this
> fully aware of the repercussions of their actions. What I don't =
understand
> is why should the protocol - which is aimed at interoperability - =
bother
> with it?

I do agree that is the central question.

>=20
> We got people here representing many companies, large and small. Can =
one of
> them please raise their hand and ask for this feature?

I am asking for us to not remove the possibility to use a non-channel, =
non-signature security method to secure OAuth tokens, so I raise my =
hand.=20

> And if they do, can
> they explain how they justify providing poor security to their users?

This sounds like a trick question ;)=20

Speaking on behalf of only myself (and not my company), I aim NOT to =
provide poor security, but to provide just the right amount of security =
for a given use-case. Where "just the right amount" means the amount =
which is of the least cost to the overall system to provide an adequate =
amount of security for a given use-case. Today, OAuth already supports =
that possibility - a sliding-scale of security, as I noted in earlier =
email. Even if we require TLS or signing, we still have more than one =
security method, and each of them has different security properties. We =
will not (as far as I can tell) ever limit ourselves to a single choice =
for providing security, and I would argue that we should not.=20

>=20
> I am no longer interested in the argument that somewhere there are =
valid use
> cases. Writing a protocol for scenarios that are not anchored in =
reality is
> bad. OAuth 1.0 does not require using a secure channel for sending =
token
> secrets because people claimed it will be a problem for some =
providers. So
> far, no such providers showed up.

I would say that it is more likely that no such providers wished to =
announce what they want to do in a public forum. But that doesn't mean =
that what they plan to do is bad for their users. Security requires =
tradeoffs, and people should be both forced, and allowed to make those =
tradeoffs - based on their own analysis, not some standard. Public =
pressure _will_ limit what providers actually offer their users, but =
that is a market force and shouldn't be enforced in a standard (in my =
opinion anyway). =20

>=20
> If someone want to argue the need of no-crypto / no-HTTPS, while =
showing how
> that need justifies subjecting the web to more bad protocols and poor
> foresight, I am eager to listen.
>=20
> If you don't care about security, you are free to implement the =
protocol
> poorly. There is no OAuth Police to enforce servers to check signature =
and
> reject requests with bad ones. At least by forcing such cases to break =
the
> protocol, we are forcing them to make an active decision and we get =
their
> API users to notice.

Yes, if the community as a whole decides that my argument is weak, then =
I certainly would concede. We can decide as a group that we don't want =
to support the minimal-security use-cases by mandating crypto, and I =
will bow to the will of the community in that decision. I think there is =
an advantage to making as many implementations as possible conformant to =
OAuth, but perhaps not everyone in the community agrees with that?=20

>=20
> There is also a case to be made about pushing the envelope when it =
comes to
> security. The more services use TLS, the cheaper and easier it will =
get.
> That's economics 101. And unlike writing new code for new OAuth =
signatures,
> requiring TLS will simply mean linking another library and making a =
function
> call.
>=20
> My vote is to start with an HTTPS requirement for any unsigned =
request, and
> let those who have real reasons to object show up. None of the current =
users
> of OAuth 1.0 will be able to claim this since they all use HTTPS for =
all
> such requests.

I am not prepared to name names. But I will say that I have helped =
design two OAuth-like protocols in my career, and in both cases, we were =
asked by some customers of those protocols to allow bearer tokens =
without TLS.=20

When I look at what is possible in the offline world, I would ask - =
would you require that movie theatre tickets bought in advance were =
encrypted in transport between the person who bought the ticket and the =
receptionist at the cinema? What if the person drops her ticket and it's =
picked up by someone else? The risk of someone dropping his ticket is =
low, so we don't bother to secure it (of course, I haven't been to a =
city movie theatre in years so perhaps you need to show ID even to see a =
movie these days -- I hope not ;) Of course, the person who _does_ drop =
his ticket will be mad when he gets to the movie theatre, but probably =
not too mad. The system has worked quite well without any real security. =
We might add more security, but it would, even today, probably be hard =
to justify the cost.=20

Yes, those things change over time, but having a sliding scale of =
security is a good thing, not a bad thing - and that is already allowed =
by OAuth today, (TLS/SSL+PLAINTEXT, RSA-SHA1, HMAC-SHA1, PLAINTEXT) and =
will continue even if you remove PLAINTEXT from the list.

- johnk

>=20
> EHL
>=20
>=20
> On 1/14/10 5:59 AM, "John Kemp" <john@jkemp.net> wrote:
>=20
>> Hi Blaine,
>>=20
>> On Jan 14, 2010, at 7:10 AM, Blaine Cook wrote:
>>=20
>>> OAuth WRAP is very similar to cookies as deployed by major vendors.
>>=20
>> How is that relevant to _this_ discussion (I apologize, I don't know =
much
>> about WRAP)?
>>=20
>>>=20
>>> Google has just switched to HTTPS-by-default for all GMail
>>> sessions[1],
>>=20
>> Yes, HTTPS by default, and they are doing it in order to secure the =
exchange
>> of email - allowing emails to remain confidential on insecure =
networks. I
>> think that is a strong use-case for requiring confidentiality.
>>=20
>> But not all use-cases for OAuth need that much confidentiality, or =
any
>> confidentiality at all.
>>=20
>>> and my understanding (per [2]) is that access to
>>> authenticated sessions (i.e., full GMail or Google Docs access =
versus
>>> just displaying "bob@gmail.com" on the page) is always negotiated =
with
>>> a secure cookie. Thus, Google has made decisions internally to =
secure
>>> the equivalent of both the Refresh and the Bearer token, short-lived
>>> assurances aside.
>>>=20
>>> We're also entering an age where we have enough computing power to
>>> *factor* RSA-1024 in non-infinite-time; handheld devices that are
>>> realistically expected to use these protocols have sufficient
>>> computing power and battery life to encrypt HTTP requests and =
decrypt
>>> the responses (my phone already does this for all Twitter and email
>>> requests; yours probably does, too).
>>=20
>> I guess my concern about performance is more at the server-side, =
where many
>> requests may be processed more or less simultaneously. Back in the =
old days
>> (1997) we had a special crypto hardware accelerator in our =
Internet-connected
>> proxies, and our non-Internet connected machines wouldn't use SSL at =
all,
>> because of the performance impact.
>>=20
>> I'm sure things are better these days, but crypto operations still =
add
>> performance overhead that may not in practice be necessary for every =
use-case.
>>=20
>>>=20
>>> As such, I can't see how *not* requiring SSL for unsigned requests
>>> could pass muster at an IETF security review.
>>=20
>> Well, I don't know what is required to pass IETF security review, and =
perhaps
>> you're right, but the point is really whether there are cases where a
>> combination of short-lifespan + replay-prevention and possibly other
>> non-transport things could provide enough security to allow people to =
perform
>> real work with OAuth tokens.
>>=20
>> And I think there are such cases - rather vaguely I could say that =
the broad
>> category would be anything for which a large volume of authorized =
requests is
>> possible, and where the "value" in an individual request is low. That
>> certainly does not include email, which I rather think _is_ deserving =
of
>> confidentiality over insecure networks (of course, Gmail does allow =
you to
>> turn off https if you are in a more secure network environment).
>>=20
>> Regards,
>>=20
>> - johnk
>>=20
>>>=20
>>> [1] =
http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html
>>> [2]=20
>>> =
http://googleonlinesecurity.blogspot.com/2009/06/https-security-for-web-ap=
pli
>>> cations.html
>>>=20
>>> 2010/1/14 John Kemp <john@jkemp.net>:
>>>>=20
>>>> On Jan 14, 2010, at 1:05 AM, Eran Hammer-Lahav wrote:
>>>>=20
>>>> [...]
>>>>>=20
>>>>> QUESTIONS: Are there any valid (such that will pass IETF security =
review
>>>>> scrutiny) reasons for allowing unsigned requests to be sent in the =
clear
>>>>> over an insecure channel? Are there use cases for this (regardless =
of their
>>>>> security properties)?
>>>>=20
>>>> I am still wavering on this.
>>>>=20
>>>> I think that using a bearer token with short lifetime and one-time =
use
>>>> semantics (for example) is probably sufficient security for many =
use-cases.
>>>> And using TLS/SSL (or even just signing and verifying a signed =
request) in
>>>> all cases may provide too much performance overhead for some of =
those cases.
>>>>=20
>>>> In other words, I think that it's not only channel security we need =
to
>>>> consider, but a combination of other measures that would, in some =
cases,
>>>> obviate the need for TLS.
>>>>=20
>>>> Regards,
>>>>=20
>>>> - johnk
>>>>=20
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>=20
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>=20
>=20


From john@jkemp.net  Fri Jan 15 08:06:15 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D16843A6B04 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 08:06:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.184
X-Spam-Level: 
X-Spam-Status: No, score=-2.184 tagged_above=-999 required=5 tests=[AWL=0.081,  BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HoeWsJOs+hqG for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 08:06:14 -0800 (PST)
Received: from outbound-mail-313.bluehost.com (outbound-mail-313.bluehost.com [67.222.54.6]) by core3.amsl.com (Postfix) with SMTP id B370B3A6AF9 for <oauth@ietf.org>; Fri, 15 Jan 2010 08:06:14 -0800 (PST)
Received: (qmail 9263 invoked by uid 0); 15 Jan 2010 16:06:11 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy6.bluehost.com with SMTP; 15 Jan 2010 16:06:11 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=NxcRG0+ccOdzlXJuC9gnP92rnt8AAdwMcDeEaddctn0jx3g/o2WHTW6qcTwxC3cXajB7tY9bUQ9l7wEKzae2T1PyCruaDIuhiaUQZGdMvHkj3d7+bvfC17V1HZLE2ubL;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVoga-0006xP-90; Fri, 15 Jan 2010 09:06:11 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com>
Date: Fri, 15 Jan 2010 11:06:06 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 16:06:15 -0000

On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:

>> As such, I can't see how *not* requiring SSL for unsigned requests
>> could pass muster at an IETF security review.
>=20
> Speaking as someone who does IETF security reviews ...  :)
>=20
> If I were reviewing a document that defines an optional insecure mode =
of operation (in this case, operating without TLS), I would be looking =
for basically two things: (1) A discussion of the risks if the insecure =
mode is used, and (2) a motivation for why these risks might be =
acceptable in certain cases.  This is in the spirit of =
"MUST=3DSHOULD+exception" -- if it's a SHOULD, you need to explain the =
exception.  In this case, the risks (1) are pretty obvious: A passive =
observer can steal your password and use it to authenticate as you.  The =
motivations (2) are what this thread is about.
>=20
> I would also observe that "MUST use TLS or equivalent" is actually the =
same as "SHOULD use TLS", since the "or equivalent" isn't really =
specified.

Right. Which is why I'm currently OK with Eran's text either way as I =
think it allows bearer tokens with *any* other security protections, =
unless we specify exactly which security properties should be provided =
by the channel, vs. via other mechanisms.=20

SAML's "confirmation method" is sort of the equivalent idea to what =
we've been talking about here (where the method could be =
"holder-of-key+a signature algorithm", "bearer" or something else) but =
we also haven't separated out security properties such as integrity or =
confidentiality for the purposes of this discussion.=20

>  (This is really obvious when you think about it from the perspective =
of an implementor: If you're going to cover the "or equivalent" cases, =
then you have to have be able to operate in non-TLS mode.)  The "or =
equivalent" cases are the ones where not using TLS might be acceptable, =
i.e., the ones that should be cited as motivations (2) for allowing the =
non-secure mode. =20
>=20
> Taking the SECDIR hat off, it seems to me that there are some =
motivations appearing in this thread:
> -- Appropriate key management (frequent key refresh)
> -- Private trusted networks
> -- John's observation that "URL+token" =3D=3D "private URL"
> So ISTM that "SHOULD use TLS" could be motivated here.
>=20
> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST =
implement" so that it's there if people want to use it.)

+1=20

- johnk=

From eve@xmlgrrl.com  Fri Jan 15 08:19:21 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 16B043A63EB for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 08:19:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.708
X-Spam-Level: *
X-Spam-Status: No, score=1.708 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NImdOFttpRVz for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 08:19:20 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id E49783A6403 for <oauth@ietf.org>; Fri, 15 Jan 2010 08:19:19 -0800 (PST)
Received: from [192.168.168.185] ([192.168.168.185]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o0FGItts008263 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 15 Jan 2010 08:19:16 -0800
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net>
Date: Fri, 15 Jan 2010 08:18:55 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net>
To: OAuth WG <oauth@ietf.org>
X-Mailer: Apple Mail (2.1077)
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 16:19:21 -0000

The points about matching security to use case are excellent.  This is =
why I think we're maybe misinterpreting Eran's argument for MUST.  It's =
not an argument from security alone ("we must always have highest =
security all the time"); it's an argument from interoperability of =
security features at Internet scale ("in the general/at-scale case, we =
should not accept deployed instances that do not support this important =
security feature").

On this basis, it's reasonable to argue for MUST for implementing TLS =
(with no weasel words about "or equivalent", since this isn't a testable =
protocol clause), for the broad ecosystem benefits.

	Eve

On 15 Jan 2010, at 8:06 AM, John Kemp wrote:

> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
>=20
>>> As such, I can't see how *not* requiring SSL for unsigned requests
>>> could pass muster at an IETF security review.
>>=20
>> Speaking as someone who does IETF security reviews ...  :)
>>=20
>> If I were reviewing a document that defines an optional insecure mode =
of operation (in this case, operating without TLS), I would be looking =
for basically two things: (1) A discussion of the risks if the insecure =
mode is used, and (2) a motivation for why these risks might be =
acceptable in certain cases.  This is in the spirit of =
"MUST=3DSHOULD+exception" -- if it's a SHOULD, you need to explain the =
exception.  In this case, the risks (1) are pretty obvious: A passive =
observer can steal your password and use it to authenticate as you.  The =
motivations (2) are what this thread is about.
>>=20
>> I would also observe that "MUST use TLS or equivalent" is actually =
the same as "SHOULD use TLS", since the "or equivalent" isn't really =
specified.
>=20
> Right. Which is why I'm currently OK with Eran's text either way as I =
think it allows bearer tokens with *any* other security protections, =
unless we specify exactly which security properties should be provided =
by the channel, vs. via other mechanisms.=20
>=20
> SAML's "confirmation method" is sort of the equivalent idea to what =
we've been talking about here (where the method could be =
"holder-of-key+a signature algorithm", "bearer" or something else) but =
we also haven't separated out security properties such as integrity or =
confidentiality for the purposes of this discussion.=20
>=20
>> (This is really obvious when you think about it from the perspective =
of an implementor: If you're going to cover the "or equivalent" cases, =
then you have to have be able to operate in non-TLS mode.)  The "or =
equivalent" cases are the ones where not using TLS might be acceptable, =
i.e., the ones that should be cited as motivations (2) for allowing the =
non-secure mode. =20
>>=20
>> Taking the SECDIR hat off, it seems to me that there are some =
motivations appearing in this thread:
>> -- Appropriate key management (frequent key refresh)
>> -- Private trusted networks
>> -- John's observation that "URL+token" =3D=3D "private URL"
>> So ISTM that "SHOULD use TLS" could be motivated here.
>>=20
>> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST =
implement" so that it's there if people want to use it.)
>=20
> +1=20
>=20
> - johnk


Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog


From jpanzer@google.com  Fri Jan 15 08:43:04 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 74F173A6963 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 08:43:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.493
X-Spam-Level: 
X-Spam-Status: No, score=-105.493 tagged_above=-999 required=5 tests=[AWL=-0.322, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RbQ4zOo4euia for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 08:43:03 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id F28093A68FF for <oauth@ietf.org>; Fri, 15 Jan 2010 08:43:02 -0800 (PST)
Received: from spaceape10.eur.corp.google.com (spaceape10.eur.corp.google.com [172.28.16.144]) by smtp-out.google.com with ESMTP id o0FGgwBx015768 for <oauth@ietf.org>; Fri, 15 Jan 2010 16:42:58 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263573778; bh=xUwaQklViufJHHsaovQNyc4cNfU=; h=MIME-Version:In-Reply-To:References:Date:Message-ID:Subject:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=D1YmV9zfNplHNgGKpgRbMc6XxJXIeu0mu7dq0tA9NfG11FToo2eWE3HgCzhWuH8NX o/yK3Md35UM2ePd6tBVyQ==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:date:message-id:subject:from:to: cc:content-type:content-transfer-encoding:x-system-of-record; b=E5+SINVloec01W2y76oFWZcjQT670Zl2miJx7GO5CD3MoWLjey5rWanypPdmFpDJP R7k0aoc6pQSC/Zgt6OlFA==
Received: from pwi14 (pwi14.prod.google.com [10.241.219.14]) by spaceape10.eur.corp.google.com with ESMTP id o0FGgSX2020641 for <oauth@ietf.org>; Fri, 15 Jan 2010 08:42:57 -0800
Received: by pwi14 with SMTP id 14so425807pwi.13 for <oauth@ietf.org>; Fri, 15 Jan 2010 08:42:56 -0800 (PST)
MIME-Version: 1.0
Received: by 10.114.23.5 with SMTP id 5mr1829217waw.41.1263573775994; Fri, 15  Jan 2010 08:42:55 -0800 (PST)
In-Reply-To: <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net> <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com>
Date: Fri, 15 Jan 2010 08:42:55 -0800
Message-ID: <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com>
From: John Panzer <jpanzer@google.com>
To: Eve Maler <eve@xmlgrrl.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 16:43:04 -0000

+1 to MUST implement TLS on both sides.

I thought we were only discussing whether the server could decide to
skip TLS for a particular use case.  No?

On Friday, January 15, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
> The points about matching security to use case are excellent. =A0This is =
why I think we're maybe misinterpreting Eran's argument for MUST. =A0It's n=
ot an argument from security alone ("we must always have highest security a=
ll the time"); it's an argument from interoperability of security features =
at Internet scale ("in the general/at-scale case, we should not accept depl=
oyed instances that do not support this important security feature").
>
> On this basis, it's reasonable to argue for MUST for implementing TLS (wi=
th no weasel words about "or equivalent", since this isn't a testable proto=
col clause), for the broad ecosystem benefits.
>
>  =A0 =A0 =A0 =A0Eve
>
> On 15 Jan 2010, at 8:06 AM, John Kemp wrote:
>
>> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
>>
>>>> As such, I can't see how *not* requiring SSL for unsigned requests
>>>> could pass muster at an IETF security review.
>>>
>>> Speaking as someone who does IETF security reviews ... =A0:)
>>>
>>> If I were reviewing a document that defines an optional insecure mode o=
f operation (in this case, operating without TLS), I would be looking for b=
asically two things: (1) A discussion of the risks if the insecure mode is =
used, and (2) a motivation for why these risks might be acceptable in certa=
in cases. =A0This is in the spirit of "MUST=3DSHOULD+exception" -- if it's =
a SHOULD, you need to explain the exception. =A0In this case, the risks (1)=
 are pretty obvious: A passive observer can steal your password and use it =
to authenticate as you. =A0The motivations (2) are what this thread is abou=
t.
>>>
>>> I would also observe that "MUST use TLS or equivalent" is actually the =
same as "SHOULD use TLS", since the "or equivalent" isn't really specified.
>>
>> Right. Which is why I'm currently OK with Eran's text either way as I th=
ink it allows bearer tokens with *any* other security protections, unless w=
e specify exactly which security properties should be provided by the chann=
el, vs. via other mechanisms.
>>
>> SAML's "confirmation method" is sort of the equivalent idea to what we'v=
e been talking about here (where the method could be "holder-of-key+a signa=
ture algorithm", "bearer" or something else) but we also haven't separated =
out security properties such as integrity or confidentiality for the purpos=
es of this discussion.
>>
>>> (This is really obvious when you think about it from the perspective of=
 an implementor: If you're going to cover the "or equivalent" cases, then y=
ou have to have be able to operate in non-TLS mode.) =A0The "or equivalent"=
 cases are the ones where not using TLS might be acceptable, i.e., the ones=
 that should be cited as motivations (2) for allowing the non-secure mode.
>>>
>>> Taking the SECDIR hat off, it seems to me that there are some motivatio=
ns appearing in this thread:
>>> -- Appropriate key management (frequent key refresh)
>>> -- Private trusted networks
>>> -- John's observation that "URL+token" =3D=3D "private URL"
>>> So ISTM that "SHOULD use TLS" could be motivated here.
>>>
>>> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST i=
mplement" so that it's there if people want to use it.)
>>
>> +1
>>
>> - johnk
>
>
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--=20
--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer

From john.hurliman@intel.com  Fri Jan 15 10:01:37 2010
Return-Path: <john.hurliman@intel.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 192D33A67A3 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 10:01:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.793
X-Spam-Level: 
X-Spam-Status: No, score=-5.793 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UaGpAx1UJQqE for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 10:01:35 -0800 (PST)
Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by core3.amsl.com (Postfix) with ESMTP id CF2103A681B for <oauth@ietf.org>; Fri, 15 Jan 2010 10:01:35 -0800 (PST)
Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga102.fm.intel.com with ESMTP; 15 Jan 2010 10:01:10 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.49,282,1262592000"; d="scan'208";a="764577763"
Received: from rrsmsx604.amr.corp.intel.com ([10.31.0.170]) by fmsmga001.fm.intel.com with ESMTP; 15 Jan 2010 10:01:28 -0800
Received: from rrsmsx601.amr.corp.intel.com (10.31.0.151) by rrsmsx604.amr.corp.intel.com (10.31.0.170) with Microsoft SMTP Server (TLS) id 8.2.176.0; Fri, 15 Jan 2010 11:01:28 -0700
Received: from rrsmsx506.amr.corp.intel.com ([10.31.0.39]) by rrsmsx601.amr.corp.intel.com ([10.31.0.151]) with mapi; Fri, 15 Jan 2010 11:01:27 -0700
From: "Hurliman, John" <john.hurliman@intel.com>
To: OAuth WG <oauth@ietf.org>
Date: Fri, 15 Jan 2010 11:01:23 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqWAdDlQdNVab7yTZG3E555zuQNMQACr1Qw
Message-ID: <62BFE5680C037E4DA0B0A08946C0933DC486ED19@rrsmsx506.amr.corp.intel.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net> <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com> <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com>
In-Reply-To: <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 18:01:37 -0000

+1 to this as well. Any implementation is free to deviate from the spec, at=
 the risk of breaking interoperability.

John

-----Original Message-----
From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of J=
ohn Panzer
Sent: Friday, January 15, 2010 8:43 AM
To: Eve Maler
Cc: OAuth WG
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channel=
s

+1 to MUST implement TLS on both sides.

I thought we were only discussing whether the server could decide to
skip TLS for a particular use case.  No?

On Friday, January 15, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
> The points about matching security to use case are excellent. =A0This is =
why I think we're maybe misinterpreting Eran's argument for MUST. =A0It's n=
ot an argument from security alone ("we must always have highest security a=
ll the time"); it's an argument from interoperability of security features =
at Internet scale ("in the general/at-scale case, we should not accept depl=
oyed instances that do not support this important security feature").
>
> On this basis, it's reasonable to argue for MUST for implementing TLS (wi=
th no weasel words about "or equivalent", since this isn't a testable proto=
col clause), for the broad ecosystem benefits.
>
>  =A0 =A0 =A0 =A0Eve
>
> On 15 Jan 2010, at 8:06 AM, John Kemp wrote:
>
>> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
>>
>>>> As such, I can't see how *not* requiring SSL for unsigned requests
>>>> could pass muster at an IETF security review.
>>>
>>> Speaking as someone who does IETF security reviews ... =A0:)
>>>
>>> If I were reviewing a document that defines an optional insecure mode o=
f operation (in this case, operating without TLS), I would be looking for b=
asically two things: (1) A discussion of the risks if the insecure mode is =
used, and (2) a motivation for why these risks might be acceptable in certa=
in cases. =A0This is in the spirit of "MUST=3DSHOULD+exception" -- if it's =
a SHOULD, you need to explain the exception. =A0In this case, the risks (1)=
 are pretty obvious: A passive observer can steal your password and use it =
to authenticate as you. =A0The motivations (2) are what this thread is abou=
t.
>>>
>>> I would also observe that "MUST use TLS or equivalent" is actually the =
same as "SHOULD use TLS", since the "or equivalent" isn't really specified.
>>
>> Right. Which is why I'm currently OK with Eran's text either way as I th=
ink it allows bearer tokens with *any* other security protections, unless w=
e specify exactly which security properties should be provided by the chann=
el, vs. via other mechanisms.
>>
>> SAML's "confirmation method" is sort of the equivalent idea to what we'v=
e been talking about here (where the method could be "holder-of-key+a signa=
ture algorithm", "bearer" or something else) but we also haven't separated =
out security properties such as integrity or confidentiality for the purpos=
es of this discussion.
>>
>>> (This is really obvious when you think about it from the perspective of=
 an implementor: If you're going to cover the "or equivalent" cases, then y=
ou have to have be able to operate in non-TLS mode.) =A0The "or equivalent"=
 cases are the ones where not using TLS might be acceptable, i.e., the ones=
 that should be cited as motivations (2) for allowing the non-secure mode.
>>>
>>> Taking the SECDIR hat off, it seems to me that there are some motivatio=
ns appearing in this thread:
>>> -- Appropriate key management (frequent key refresh)
>>> -- Private trusted networks
>>> -- John's observation that "URL+token" =3D=3D "private URL"
>>> So ISTM that "SHOULD use TLS" could be motivated here.
>>>
>>> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST i=
mplement" so that it's there if people want to use it.)
>>
>> +1
>>
>> - johnk
>
>
> Eve Maler
> eve@xmlgrrl.com
> http://www.xmlgrrl.com/blog
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--=20
--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

From jpanzer@google.com  Fri Jan 15 10:30:20 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3AEE23A67FF for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 10:30:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.439
X-Spam-Level: 
X-Spam-Status: No, score=-105.439 tagged_above=-999 required=5 tests=[AWL=-0.269, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C0n5tX0TpqSt for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 10:30:18 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.33.17]) by core3.amsl.com (Postfix) with ESMTP id 982CA3A67EE for <oauth@ietf.org>; Fri, 15 Jan 2010 10:30:17 -0800 (PST)
Received: from kpbe12.cbf.corp.google.com (kpbe12.cbf.corp.google.com [172.25.105.76]) by smtp-out.google.com with ESMTP id o0FIUCGY023138 for <oauth@ietf.org>; Fri, 15 Jan 2010 18:30:13 GMT
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263580213; bh=EJW5iZPmvJi2kfcMld5SV6S9egA=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=Zrj0ld3S+w6UVc+4lzXKQYVzlqaGdvZ2i4YxgWD+TNnM3AF77D7PZuCHLZj4OW+6M C7t4c0k5SeuV9cht9WaMw==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=cX9F/lEiaPcujs/hwh7701f9AMCRBLuFxfw9DfBtsEaJqf64EmUIexir8Ae+PoZK7 E7uT+ML7ugFYSyDeDiyQg==
Received: from yxe6 (yxe6.prod.google.com [10.190.2.6]) by kpbe12.cbf.corp.google.com with ESMTP id o0FIUBDV018694 for <oauth@ietf.org>; Fri, 15 Jan 2010 10:30:11 -0800
Received: by yxe6 with SMTP id 6so706847yxe.13 for <oauth@ietf.org>; Fri, 15 Jan 2010 10:30:11 -0800 (PST)
MIME-Version: 1.0
Received: by 10.150.74.18 with SMTP id w18mr1293356yba.223.1263580210702; Fri,  15 Jan 2010 10:30:10 -0800 (PST)
In-Reply-To: <62BFE5680C037E4DA0B0A08946C0933DC486ED19@rrsmsx506.amr.corp.intel.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>  <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>  <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net>  <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com> <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com>  <62BFE5680C037E4DA0B0A08946C0933DC486ED19@rrsmsx506.amr.corp.intel.com>
From: John Panzer <jpanzer@google.com>
Date: Fri, 15 Jan 2010 10:29:50 -0800
Message-ID: <cb5f7a381001151029w31bc5788kd8033a0fdec5a48@mail.gmail.com>
To: "Hurliman, John" <john.hurliman@intel.com>
Content-Type: multipart/alternative; boundary=000e0cd3b0329ad3b6047d383171
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 18:30:20 -0000

--000e0cd3b0329ad3b6047d383171
Content-Type: text/plain; charset=ISO-8859-1

I think the question at hand is:  If a server says it wants to do bearer
tokens and no TLS, is a client obligated to interop in order to claim spec
compliance?

--
John Panzer / Google
jpanzer@google.com / abstractioneer.org / @jpanzer



On Fri, Jan 15, 2010 at 10:01 AM, Hurliman, John <john.hurliman@intel.com>wrote:

> +1 to this as well. Any implementation is free to deviate from the spec, at
> the risk of breaking interoperability.
>
> John
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of
> John Panzer
> Sent: Friday, January 15, 2010 8:43 AM
> To: Eve Maler
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure
> Channels
>
> +1 to MUST implement TLS on both sides.
>
> I thought we were only discussing whether the server could decide to
> skip TLS for a particular use case.  No?
>
> On Friday, January 15, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
> > The points about matching security to use case are excellent.  This is
> why I think we're maybe misinterpreting Eran's argument for MUST.  It's not
> an argument from security alone ("we must always have highest security all
> the time"); it's an argument from interoperability of security features at
> Internet scale ("in the general/at-scale case, we should not accept deployed
> instances that do not support this important security feature").
> >
> > On this basis, it's reasonable to argue for MUST for implementing TLS
> (with no weasel words about "or equivalent", since this isn't a testable
> protocol clause), for the broad ecosystem benefits.
> >
> >         Eve
> >
> > On 15 Jan 2010, at 8:06 AM, John Kemp wrote:
> >
> >> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
> >>
> >>>> As such, I can't see how *not* requiring SSL for unsigned requests
> >>>> could pass muster at an IETF security review.
> >>>
> >>> Speaking as someone who does IETF security reviews ...  :)
> >>>
> >>> If I were reviewing a document that defines an optional insecure mode
> of operation (in this case, operating without TLS), I would be looking for
> basically two things: (1) A discussion of the risks if the insecure mode is
> used, and (2) a motivation for why these risks might be acceptable in
> certain cases.  This is in the spirit of "MUST=SHOULD+exception" -- if it's
> a SHOULD, you need to explain the exception.  In this case, the risks (1)
> are pretty obvious: A passive observer can steal your password and use it to
> authenticate as you.  The motivations (2) are what this thread is about.
> >>>
> >>> I would also observe that "MUST use TLS or equivalent" is actually the
> same as "SHOULD use TLS", since the "or equivalent" isn't really specified.
> >>
> >> Right. Which is why I'm currently OK with Eran's text either way as I
> think it allows bearer tokens with *any* other security protections, unless
> we specify exactly which security properties should be provided by the
> channel, vs. via other mechanisms.
> >>
> >> SAML's "confirmation method" is sort of the equivalent idea to what
> we've been talking about here (where the method could be "holder-of-key+a
> signature algorithm", "bearer" or something else) but we also haven't
> separated out security properties such as integrity or confidentiality for
> the purposes of this discussion.
> >>
> >>> (This is really obvious when you think about it from the perspective of
> an implementor: If you're going to cover the "or equivalent" cases, then you
> have to have be able to operate in non-TLS mode.)  The "or equivalent" cases
> are the ones where not using TLS might be acceptable, i.e., the ones that
> should be cited as motivations (2) for allowing the non-secure mode.
> >>>
> >>> Taking the SECDIR hat off, it seems to me that there are some
> motivations appearing in this thread:
> >>> -- Appropriate key management (frequent key refresh)
> >>> -- Private trusted networks
> >>> -- John's observation that "URL+token" == "private URL"
> >>> So ISTM that "SHOULD use TLS" could be motivated here.
> >>>
> >>> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST
> implement" so that it's there if people want to use it.)
> >>
> >> +1
> >>
> >> - johnk
> >
> >
> > Eve Maler
> > eve@xmlgrrl.com
> > http://www.xmlgrrl.com/blog
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
>
> --
> --
> John Panzer / Google
> jpanzer@google.com / abstractioneer.org / @jpanzer
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--000e0cd3b0329ad3b6047d383171
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I think the question at hand is: =A0If a server says it wants to do bearer =
tokens and no TLS, is a client obligated to interop in order to claim spec =
compliance?<div><br></div><div>--<br>John Panzer / Google<br><a href=3D"mai=
lto:jpanzer@google.com">jpanzer@google.com</a> / <a href=3D"http://abstract=
ioneer.org">abstractioneer.org</a> / @jpanzer<br>

<br>
<br><br><div class=3D"gmail_quote">On Fri, Jan 15, 2010 at 10:01 AM, Hurlim=
an, John <span dir=3D"ltr">&lt;<a href=3D"mailto:john.hurliman@intel.com">j=
ohn.hurliman@intel.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex;">

+1 to this as well. Any implementation is free to deviate from the spec, at=
 the risk of breaking interoperability.<br>
<font color=3D"#888888"><br>
John<br>
</font><div><div></div><div class=3D"h5"><br>
-----Original Message-----<br>
From: <a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> =
[mailto:<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a=
>] On Behalf Of John Panzer<br>
Sent: Friday, January 15, 2010 8:43 AM<br>
To: Eve Maler<br>
Cc: OAuth WG<br>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channel=
s<br>
<br>
+1 to MUST implement TLS on both sides.<br>
<br>
I thought we were only discussing whether the server could decide to<br>
skip TLS for a particular use case. =A0No?<br>
<br>
On Friday, January 15, 2010, Eve Maler &lt;<a href=3D"mailto:eve@xmlgrrl.co=
m">eve@xmlgrrl.com</a>&gt; wrote:<br>
&gt; The points about matching security to use case are excellent. =A0This =
is why I think we&#39;re maybe misinterpreting Eran&#39;s argument for MUST=
. =A0It&#39;s not an argument from security alone (&quot;we must always hav=
e highest security all the time&quot;); it&#39;s an argument from interoper=
ability of security features at Internet scale (&quot;in the general/at-sca=
le case, we should not accept deployed instances that do not support this i=
mportant security feature&quot;).<br>


&gt;<br>
&gt; On this basis, it&#39;s reasonable to argue for MUST for implementing =
TLS (with no weasel words about &quot;or equivalent&quot;, since this isn&#=
39;t a testable protocol clause), for the broad ecosystem benefits.<br>


&gt;<br>
&gt; =A0=A0 =A0 =A0 =A0Eve<br>
&gt;<br>
&gt; On 15 Jan 2010, at 8:06 AM, John Kemp wrote:<br>
&gt;<br>
&gt;&gt; On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:<br>
&gt;&gt;<br>
&gt;&gt;&gt;&gt; As such, I can&#39;t see how *not* requiring SSL for unsig=
ned requests<br>
&gt;&gt;&gt;&gt; could pass muster at an IETF security review.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Speaking as someone who does IETF security reviews ... =A0:)<b=
r>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If I were reviewing a document that defines an optional insecu=
re mode of operation (in this case, operating without TLS), I would be look=
ing for basically two things: (1) A discussion of the risks if the insecure=
 mode is used, and (2) a motivation for why these risks might be acceptable=
 in certain cases. =A0This is in the spirit of &quot;MUST=3DSHOULD+exceptio=
n&quot; -- if it&#39;s a SHOULD, you need to explain the exception. =A0In t=
his case, the risks (1) are pretty obvious: A passive observer can steal yo=
ur password and use it to authenticate as you. =A0The motivations (2) are w=
hat this thread is about.<br>


&gt;&gt;&gt;<br>
&gt;&gt;&gt; I would also observe that &quot;MUST use TLS or equivalent&quo=
t; is actually the same as &quot;SHOULD use TLS&quot;, since the &quot;or e=
quivalent&quot; isn&#39;t really specified.<br>
&gt;&gt;<br>
&gt;&gt; Right. Which is why I&#39;m currently OK with Eran&#39;s text eith=
er way as I think it allows bearer tokens with *any* other security protect=
ions, unless we specify exactly which security properties should be provide=
d by the channel, vs. via other mechanisms.<br>


&gt;&gt;<br>
&gt;&gt; SAML&#39;s &quot;confirmation method&quot; is sort of the equivale=
nt idea to what we&#39;ve been talking about here (where the method could b=
e &quot;holder-of-key+a signature algorithm&quot;, &quot;bearer&quot; or so=
mething else) but we also haven&#39;t separated out security properties suc=
h as integrity or confidentiality for the purposes of this discussion.<br>


&gt;&gt;<br>
&gt;&gt;&gt; (This is really obvious when you think about it from the persp=
ective of an implementor: If you&#39;re going to cover the &quot;or equival=
ent&quot; cases, then you have to have be able to operate in non-TLS mode.)=
 =A0The &quot;or equivalent&quot; cases are the ones where not using TLS mi=
ght be acceptable, i.e., the ones that should be cited as motivations (2) f=
or allowing the non-secure mode.<br>


&gt;&gt;&gt;<br>
&gt;&gt;&gt; Taking the SECDIR hat off, it seems to me that there are some =
motivations appearing in this thread:<br>
&gt;&gt;&gt; -- Appropriate key management (frequent key refresh)<br>
&gt;&gt;&gt; -- Private trusted networks<br>
&gt;&gt;&gt; -- John&#39;s observation that &quot;URL+token&quot; =3D=3D &q=
uot;private URL&quot;<br>
&gt;&gt;&gt; So ISTM that &quot;SHOULD use TLS&quot; could be motivated her=
e.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; (Now, all that said, it probably wouldn&#39;t hurt to have TLS=
 as a &quot;MUST implement&quot; so that it&#39;s there if people want to u=
se it.)<br>
&gt;&gt;<br>
&gt;&gt; +1<br>
&gt;&gt;<br>
&gt;&gt; - johnk<br>
&gt;<br>
&gt;<br>
&gt; Eve Maler<br>
&gt; <a href=3D"mailto:eve@xmlgrrl.com">eve@xmlgrrl.com</a><br>
&gt; <a href=3D"http://www.xmlgrrl.com/blog" target=3D"_blank">http://www.x=
mlgrrl.com/blog</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt;<br>
<br>
--<br>
--<br>
John Panzer / Google<br>
<a href=3D"mailto:jpanzer@google.com">jpanzer@google.com</a> / <a href=3D"h=
ttp://abstractioneer.org" target=3D"_blank">abstractioneer.org</a> / @jpanz=
er<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br></div>

--000e0cd3b0329ad3b6047d383171--

From rbarnes@bbn.com  Fri Jan 15 10:41:29 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5A6953A68E8 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 10:41:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.196
X-Spam-Level: 
X-Spam-Status: No, score=-2.196 tagged_above=-999 required=5 tests=[AWL=-0.404, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8KGTU198XaRd for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 10:41:27 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 905313A67EE for <oauth@ietf.org>; Fri, 15 Jan 2010 10:41:27 -0800 (PST)
Received: from ros-dhcp192-1-51-107.bbn.com ([192.1.51.107]) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1NVr6p-0003kc-Ca; Fri, 15 Jan 2010 13:41:24 -0500
Message-Id: <32D388A4-C38A-4A1B-9F2D-1EE183E1227C@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: John Panzer <jpanzer@google.com>
In-Reply-To: <cb5f7a381001151029w31bc5788kd8033a0fdec5a48@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-9--341642273
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 15 Jan 2010 13:41:22 -0500
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net> <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com> <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com> <62BFE5680C037E4DA0B0A08946C0933DC486ED19@rrsmsx506.amr.corp.intel.com> <cb5f7a381001151029w31bc5788kd8033a0fdec5a48@mail.gmail.com>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 18:41:29 -0000

--Apple-Mail-9--341642273
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit

I would think not; it's a matter of the client's policy what  
signatures it will issue, and the server's policy which it will accept.

And in any case, OAuth doesn't have any in-band security negotiation,  
so there's no way for the server to ask for a given set of features  
(e.g., bearer tokens and no TLS) within the protocol.

--Richard



On Jan 15, 2010, at 1:29 PM, John Panzer wrote:

> I think the question at hand is:  If a server says it wants to do  
> bearer tokens and no TLS, is a client obligated to interop in order  
> to claim spec compliance?
>
> --
> John Panzer / Google
> jpanzer@google.com / abstractioneer.org / @jpanzer
>
>
>
> On Fri, Jan 15, 2010 at 10:01 AM, Hurliman, John <john.hurliman@intel.com 
> > wrote:
> +1 to this as well. Any implementation is free to deviate from the  
> spec, at the risk of breaking interoperability.
>
> John
>
> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On  
> Behalf Of John Panzer
> Sent: Friday, January 15, 2010 8:43 AM
> To: Eve Maler
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure  
> Channels
>
> +1 to MUST implement TLS on both sides.
>
> I thought we were only discussing whether the server could decide to
> skip TLS for a particular use case.  No?
>
> On Friday, January 15, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
> > The points about matching security to use case are excellent.   
> This is why I think we're maybe misinterpreting Eran's argument for  
> MUST.  It's not an argument from security alone ("we must always  
> have highest security all the time"); it's an argument from  
> interoperability of security features at Internet scale ("in the  
> general/at-scale case, we should not accept deployed instances that  
> do not support this important security feature").
> >
> > On this basis, it's reasonable to argue for MUST for implementing  
> TLS (with no weasel words about "or equivalent", since this isn't a  
> testable protocol clause), for the broad ecosystem benefits.
> >
> >         Eve
> >
> > On 15 Jan 2010, at 8:06 AM, John Kemp wrote:
> >
> >> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
> >>
> >>>> As such, I can't see how *not* requiring SSL for unsigned  
> requests
> >>>> could pass muster at an IETF security review.
> >>>
> >>> Speaking as someone who does IETF security reviews ...  :)
> >>>
> >>> If I were reviewing a document that defines an optional insecure  
> mode of operation (in this case, operating without TLS), I would be  
> looking for basically two things: (1) A discussion of the risks if  
> the insecure mode is used, and (2) a motivation for why these risks  
> might be acceptable in certain cases.  This is in the spirit of  
> "MUST=SHOULD+exception" -- if it's a SHOULD, you need to explain the  
> exception.  In this case, the risks (1) are pretty obvious: A  
> passive observer can steal your password and use it to authenticate  
> as you.  The motivations (2) are what this thread is about.
> >>>
> >>> I would also observe that "MUST use TLS or equivalent" is  
> actually the same as "SHOULD use TLS", since the "or equivalent"  
> isn't really specified.
> >>
> >> Right. Which is why I'm currently OK with Eran's text either way  
> as I think it allows bearer tokens with *any* other security  
> protections, unless we specify exactly which security properties  
> should be provided by the channel, vs. via other mechanisms.
> >>
> >> SAML's "confirmation method" is sort of the equivalent idea to  
> what we've been talking about here (where the method could be  
> "holder-of-key+a signature algorithm", "bearer" or something else)  
> but we also haven't separated out security properties such as  
> integrity or confidentiality for the purposes of this discussion.
> >>
> >>> (This is really obvious when you think about it from the  
> perspective of an implementor: If you're going to cover the "or  
> equivalent" cases, then you have to have be able to operate in non- 
> TLS mode.)  The "or equivalent" cases are the ones where not using  
> TLS might be acceptable, i.e., the ones that should be cited as  
> motivations (2) for allowing the non-secure mode.
> >>>
> >>> Taking the SECDIR hat off, it seems to me that there are some  
> motivations appearing in this thread:
> >>> -- Appropriate key management (frequent key refresh)
> >>> -- Private trusted networks
> >>> -- John's observation that "URL+token" == "private URL"
> >>> So ISTM that "SHOULD use TLS" could be motivated here.
> >>>
> >>> (Now, all that said, it probably wouldn't hurt to have TLS as a  
> "MUST implement" so that it's there if people want to use it.)
> >>
> >> +1
> >>
> >> - johnk
> >
> >
> > Eve Maler
> > eve@xmlgrrl.com
> > http://www.xmlgrrl.com/blog
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> >
>
> --
> --
> John Panzer / Google
> jpanzer@google.com / abstractioneer.org / @jpanzer
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


--Apple-Mail-9--341642273
Content-Type: text/html;
	charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; ">I would think not; it's a =
matter of the client's policy what signatures it will issue, and the =
server's policy which it will accept.<div><br></div><div>And in any =
case, OAuth doesn't have any in-band security negotiation, so there's no =
way for the server to ask for a given set of features (e.g., bearer =
tokens and no TLS) within the =
protocol.&nbsp;</div><div><br></div><div>--Richard<br><div><br></div><div>=
<br></div><div><br><div><div>On Jan 15, 2010, at 1:29 PM, John Panzer =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite">I think the question at hand is: &nbsp;If a server says it =
wants to do bearer tokens and no TLS, is a client obligated to interop =
in order to claim spec compliance?<div><br></div><div>--<br>John Panzer =
/ Google<br><a href=3D"mailto:jpanzer@google.com">jpanzer@google.com</a> =
/ <a href=3D"http://abstractioneer.org">abstractioneer.org</a> / =
@jpanzer<br> <br> <br><br><div class=3D"gmail_quote">On Fri, Jan 15, =
2010 at 10:01 AM, Hurliman, John <span dir=3D"ltr">&lt;<a =
href=3D"mailto:john.hurliman@intel.com">john.hurliman@intel.com</a>&gt;</s=
pan> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex;"> +1 to this as well. =
Any implementation is free to deviate from the spec, at the risk of =
breaking interoperability.<br> <font color=3D"#888888"><br> John<br> =
</font><div><div></div><div class=3D"h5"><br> -----Original =
Message-----<br> From: <a =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> =
[mailto:<a =
href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org</a>] On =
Behalf Of John Panzer<br> Sent: Friday, January 15, 2010 8:43 AM<br> To: =
Eve Maler<br> Cc: OAuth WG<br> Subject: Re: [OAUTH-WG] Allowing Secrets =
in the Clear Over Insecure Channels<br> <br> +1 to MUST implement TLS on =
both sides.<br> <br> I thought we were only discussing whether the =
server could decide to<br> skip TLS for a particular use case. =
&nbsp;No?<br> <br> On Friday, January 15, 2010, Eve Maler &lt;<a =
href=3D"mailto:eve@xmlgrrl.com">eve@xmlgrrl.com</a>&gt; wrote:<br> &gt; =
The points about matching security to use case are excellent. &nbsp;This =
is why I think we're maybe misinterpreting Eran's argument for MUST. =
&nbsp;It's not an argument from security alone ("we must always have =
highest security all the time"); it's an argument from interoperability =
of security features at Internet scale ("in the general/at-scale case, =
we should not accept deployed instances that do not support this =
important security feature").<br> &gt;<br> &gt; On this basis, it's =
reasonable to argue for MUST for implementing TLS (with no weasel words =
about "or equivalent", since this isn't a testable protocol clause), for =
the broad ecosystem benefits.<br> &gt;<br> &gt; &nbsp;&nbsp; &nbsp; =
&nbsp; &nbsp;Eve<br> &gt;<br> &gt; On 15 Jan 2010, at 8:06 AM, John Kemp =
wrote:<br> &gt;<br> &gt;&gt; On Jan 14, 2010, at 7:39 PM, Richard L. =
Barnes wrote:<br> &gt;&gt;<br> &gt;&gt;&gt;&gt; As such, I can't see how =
*not* requiring SSL for unsigned requests<br> &gt;&gt;&gt;&gt; could =
pass muster at an IETF security review.<br> &gt;&gt;&gt;<br> =
&gt;&gt;&gt; Speaking as someone who does IETF security reviews ... =
&nbsp;:)<br> &gt;&gt;&gt;<br> &gt;&gt;&gt; If I were reviewing a =
document that defines an optional insecure mode of operation (in this =
case, operating without TLS), I would be looking for basically two =
things: (1) A discussion of the risks if the insecure mode is used, and =
(2) a motivation for why these risks might be acceptable in certain =
cases. &nbsp;This is in the spirit of "MUST=3DSHOULD+exception" -- if =
it's a SHOULD, you need to explain the exception. &nbsp;In this case, =
the risks (1) are pretty obvious: A passive observer can steal your =
password and use it to authenticate as you. &nbsp;The motivations (2) =
are what this thread is about.<br> &gt;&gt;&gt;<br> &gt;&gt;&gt; I would =
also observe that "MUST use TLS or equivalent" is actually the same as =
"SHOULD use TLS", since the "or equivalent" isn't really specified.<br> =
&gt;&gt;<br> &gt;&gt; Right. Which is why I'm currently OK with Eran's =
text either way as I think it allows bearer tokens with *any* other =
security protections, unless we specify exactly which security =
properties should be provided by the channel, vs. via other =
mechanisms.<br> &gt;&gt;<br> &gt;&gt; SAML's "confirmation method" is =
sort of the equivalent idea to what we've been talking about here (where =
the method could be "holder-of-key+a signature algorithm", "bearer" or =
something else) but we also haven't separated out security properties =
such as integrity or confidentiality for the purposes of this =
discussion.<br> &gt;&gt;<br> &gt;&gt;&gt; (This is really obvious when =
you think about it from the perspective of an implementor: If you're =
going to cover the "or equivalent" cases, then you have to have be able =
to operate in non-TLS mode.) &nbsp;The "or equivalent" cases are the =
ones where not using TLS might be acceptable, i.e., the ones that should =
be cited as motivations (2) for allowing the non-secure mode.<br> =
&gt;&gt;&gt;<br> &gt;&gt;&gt; Taking the SECDIR hat off, it seems to me =
that there are some motivations appearing in this thread:<br> =
&gt;&gt;&gt; -- Appropriate key management (frequent key refresh)<br> =
&gt;&gt;&gt; -- Private trusted networks<br> &gt;&gt;&gt; -- John's =
observation that "URL+token" =3D=3D "private URL"<br> &gt;&gt;&gt; So =
ISTM that "SHOULD use TLS" could be motivated here.<br> &gt;&gt;&gt;<br> =
&gt;&gt;&gt; (Now, all that said, it probably wouldn't hurt to have TLS =
as a "MUST implement" so that it's there if people want to use it.)<br> =
&gt;&gt;<br> &gt;&gt; +1<br> &gt;&gt;<br> &gt;&gt; - johnk<br> &gt;<br> =
&gt;<br> &gt; Eve Maler<br> &gt; <a =
href=3D"mailto:eve@xmlgrrl.com">eve@xmlgrrl.com</a><br> &gt; <a =
href=3D"http://www.xmlgrrl.com/blog" =
target=3D"_blank">http://www.xmlgrrl.com/blog</a><br> &gt;<br> &gt; =
_______________________________________________<br> &gt; OAuth mailing =
list<br> &gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br> =
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
&gt;<br> <br> --<br> --<br> John Panzer / Google<br> <a =
href=3D"mailto:jpanzer@google.com">jpanzer@google.com</a> / <a =
href=3D"http://abstractioneer.org" =
target=3D"_blank">abstractioneer.org</a> / @jpanzer<br> =
_______________________________________________<br> OAuth mailing =
list<br> <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br> <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
_______________________________________________<br> OAuth mailing =
list<br> <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br> <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
</div></div></blockquote></div><br></div> =
_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/=
mailman/listinfo/oauth</a><br></blockquote></div><br></div></div></body></=
html>=

--Apple-Mail-9--341642273--

From jpanzer@google.com  Fri Jan 15 11:21:35 2010
Return-Path: <jpanzer@google.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9ED773A676A for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 11:21:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.401
X-Spam-Level: 
X-Spam-Status: No, score=-103.401 tagged_above=-999 required=5 tests=[AWL=-2.231, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eXb+xM68ePtW for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 11:21:32 -0800 (PST)
Received: from smtp-out.google.com (smtp-out.google.com [216.239.44.51]) by core3.amsl.com (Postfix) with ESMTP id ADEB83A6873 for <oauth@ietf.org>; Fri, 15 Jan 2010 11:21:31 -0800 (PST)
Received: from spaceape14.eur.corp.google.com (spaceape14.eur.corp.google.com [172.28.16.148]) by smtp-out.google.com with ESMTP id o0FJLRAi021885 for <oauth@ietf.org>; Fri, 15 Jan 2010 11:21:27 -0800
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=google.com; s=beta; t=1263583288; bh=79KU0LhH1xOJNjV9gAs1YnSMTtg=; h=MIME-Version:In-Reply-To:References:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=JeoXo47fPNCDys/ikeUSvhWpOlWJ/PBed5PbmMxFwW4pcacddGLnWjyupv7xZe/I6 gAfe9sTE7XZqivCQN0iwQ==
DomainKey-Signature: a=rsa-sha1; s=beta; d=google.com; c=nofws; q=dns; h=mime-version:in-reply-to:references:from:date:message-id: subject:to:cc:content-type:x-system-of-record; b=kCs71Zz7a8D2TpLwVB4/pa6t1tsiJXW7LEV6iOYpPAvDk6NT2ycQCg/DM7oG55XAx oQFAe/CYLGAtTAryYcQFQ==
Received: from ywh6 (ywh6.prod.google.com [10.192.8.6]) by spaceape14.eur.corp.google.com with ESMTP id o0FJLPsx015179 for <oauth@ietf.org>; Fri, 15 Jan 2010 11:21:26 -0800
Received: by ywh6 with SMTP id 6so803711ywh.4 for <oauth@ietf.org>; Fri, 15 Jan 2010 11:21:25 -0800 (PST)
MIME-Version: 1.0
Received: by 10.150.128.3 with SMTP id a3mr1391892ybd.120.1263583285179; Fri,  15 Jan 2010 11:21:25 -0800 (PST)
In-Reply-To: <32D388A4-C38A-4A1B-9F2D-1EE183E1227C@bbn.com>
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net>  <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com>  <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net>  <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com> <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com>  <62BFE5680C037E4DA0B0A08946C0933DC486ED19@rrsmsx506.amr.corp.intel.com> <cb5f7a381001151029w31bc5788kd8033a0fdec5a48@mail.gmail.com>  <32D388A4-C38A-4A1B-9F2D-1EE183E1227C@bbn.com>
From: John Panzer <jpanzer@google.com>
Date: Fri, 15 Jan 2010 11:21:05 -0800
Message-ID: <cb5f7a381001151121p71784a5cj5124f4b33f1f431a@mail.gmail.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Content-Type: multipart/alternative; boundary=000e0cd72252db7513047d38e8c2
X-System-Of-Record: true
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 19:21:35 -0000

--000e0cd72252db7513047d38e8c2
Content-Type: text/plain; charset=ISO-8859-1

On Fri, Jan 15, 2010 at 10:41 AM, Richard L. Barnes <rbarnes@bbn.com> wrote:

> I would think not; it's a matter of the client's policy what signatures it
> will issue, and the server's policy which it will accept.
>

That doesn't answer the interop question, though, which is the interesting
one from the standpoint of the spec.  If there is no requirement for a
common minimal-subset then there is no guarantee of interop between a random
client and a random server that both speak the same data protocol.  Most use
cases of OAuth have a custom client for every data API so this isn't an
issue, but that's not necessarily the case, especially as new protocols
start to depend on OAuth for their security needs.


>
> And in any case, OAuth doesn't have any in-band security negotiation, so
> there's no way for the server to ask for a given set of features (e.g.,
> bearer tokens and no TLS) within the protocol.
>
>
See however https://groups.google.com/group/oauth-key-discovery for a very
needed extension that does add key discovery and rotation.  Even without
that, the question is just punted to the out of band documentation:  Is a
server allowed to support only bearer tokens and no TLS for some use case?



--Richard
>
>
>
>
> On Jan 15, 2010, at 1:29 PM, John Panzer wrote:
>
> I think the question at hand is:  If a server says it wants to do bearer
> tokens and no TLS, is a client obligated to interop in order to claim spec
> compliance?
>
> --
> John Panzer / Google
> jpanzer@google.com / abstractioneer.org / @jpanzer
>
>
>
> On Fri, Jan 15, 2010 at 10:01 AM, Hurliman, John <john.hurliman@intel.com>wrote:
>
>> +1 to this as well. Any implementation is free to deviate from the spec,
>> at the risk of breaking interoperability.
>>
>> John
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of
>> John Panzer
>> Sent: Friday, January 15, 2010 8:43 AM
>> To: Eve Maler
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure
>> Channels
>>
>> +1 to MUST implement TLS on both sides.
>>
>> I thought we were only discussing whether the server could decide to
>> skip TLS for a particular use case.  No?
>>
>> On Friday, January 15, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
>> > The points about matching security to use case are excellent.  This is
>> why I think we're maybe misinterpreting Eran's argument for MUST.  It's not
>> an argument from security alone ("we must always have highest security all
>> the time"); it's an argument from interoperability of security features at
>> Internet scale ("in the general/at-scale case, we should not accept deployed
>> instances that do not support this important security feature").
>> >
>> > On this basis, it's reasonable to argue for MUST for implementing TLS
>> (with no weasel words about "or equivalent", since this isn't a testable
>> protocol clause), for the broad ecosystem benefits.
>> >
>> >         Eve
>> >
>> > On 15 Jan 2010, at 8:06 AM, John Kemp wrote:
>> >
>> >> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
>> >>
>> >>>> As such, I can't see how *not* requiring SSL for unsigned requests
>> >>>> could pass muster at an IETF security review.
>> >>>
>> >>> Speaking as someone who does IETF security reviews ...  :)
>> >>>
>> >>> If I were reviewing a document that defines an optional insecure mode
>> of operation (in this case, operating without TLS), I would be looking for
>> basically two things: (1) A discussion of the risks if the insecure mode is
>> used, and (2) a motivation for why these risks might be acceptable in
>> certain cases.  This is in the spirit of "MUST=SHOULD+exception" -- if it's
>> a SHOULD, you need to explain the exception.  In this case, the risks (1)
>> are pretty obvious: A passive observer can steal your password and use it to
>> authenticate as you.  The motivations (2) are what this thread is about.
>> >>>
>> >>> I would also observe that "MUST use TLS or equivalent" is actually the
>> same as "SHOULD use TLS", since the "or equivalent" isn't really specified.
>> >>
>> >> Right. Which is why I'm currently OK with Eran's text either way as I
>> think it allows bearer tokens with *any* other security protections, unless
>> we specify exactly which security properties should be provided by the
>> channel, vs. via other mechanisms.
>> >>
>> >> SAML's "confirmation method" is sort of the equivalent idea to what
>> we've been talking about here (where the method could be "holder-of-key+a
>> signature algorithm", "bearer" or something else) but we also haven't
>> separated out security properties such as integrity or confidentiality for
>> the purposes of this discussion.
>> >>
>> >>> (This is really obvious when you think about it from the perspective
>> of an implementor: If you're going to cover the "or equivalent" cases, then
>> you have to have be able to operate in non-TLS mode.)  The "or equivalent"
>> cases are the ones where not using TLS might be acceptable, i.e., the ones
>> that should be cited as motivations (2) for allowing the non-secure mode.
>> >>>
>> >>> Taking the SECDIR hat off, it seems to me that there are some
>> motivations appearing in this thread:
>> >>> -- Appropriate key management (frequent key refresh)
>> >>> -- Private trusted networks
>> >>> -- John's observation that "URL+token" == "private URL"
>> >>> So ISTM that "SHOULD use TLS" could be motivated here.
>> >>>
>> >>> (Now, all that said, it probably wouldn't hurt to have TLS as a "MUST
>> implement" so that it's there if people want to use it.)
>> >>
>> >> +1
>> >>
>> >> - johnk
>> >
>> >
>> > Eve Maler
>> > eve@xmlgrrl.com
>> > http://www.xmlgrrl.com/blog
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> >
>>
>> --
>> --
>> John Panzer / Google
>> jpanzer@google.com / abstractioneer.org / @jpanzer
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>

--000e0cd72252db7513047d38e8c2
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div class=3D"gmail_quote">On Fri, Jan 15, 2010 at 10:41 AM, Richard L. Bar=
nes <span dir=3D"ltr">&lt;<a href=3D"mailto:rbarnes@bbn.com">rbarnes@bbn.co=
m</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margi=
n:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">

<div style=3D"word-wrap:break-word">I would think not; it&#39;s a matter of=
 the client&#39;s policy what signatures it will issue, and the server&#39;=
s policy which it will accept.</div></blockquote><div><br></div><div>That d=
oesn&#39;t answer the interop question, though, which is the interesting on=
e from the standpoint of the spec. =A0If there is no requirement for a comm=
on minimal-subset then there is no guarantee of interop between a random cl=
ient and a random server that both speak the same data protocol. =A0Most us=
e cases of OAuth have a custom client for every data API so this isn&#39;t =
an issue, but that&#39;s not necessarily the case, especially as new protoc=
ols start to depend on OAuth for their security needs.</div>

<div>=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;=
border-left:1px #ccc solid;padding-left:1ex;"><div style=3D"word-wrap:break=
-word"><div><br></div><div>And in any case, OAuth doesn&#39;t have any in-b=
and security negotiation, so there&#39;s no way for the server to ask for a=
 given set of features (e.g., bearer tokens and no TLS) within the protocol=
.=A0</div>

<div><br></div></div></blockquote><div><br></div><div>See however=A0<a href=
=3D"https://groups.google.com/group/oauth-key-discovery">https://groups.goo=
gle.com/group/oauth-key-discovery</a> for a very needed extension that does=
 add key discovery and rotation. =A0Even without that, the question is just=
 punted to the out of band documentation: =A0Is a server allowed to support=
 only bearer tokens and no TLS for some use case?</div>

<div><br></div><div><br></div><div><br></div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;=
"><div style=3D"word-wrap:break-word"><div></div><div><font color=3D"#88888=
8">--Richard</font><div>

<div></div><div class=3D"h5"><br><div><br></div><div><br></div><div><br><di=
v><div>On Jan 15, 2010, at 1:29 PM, John Panzer wrote:</div><br><blockquote=
 type=3D"cite">I think the question at hand is: =A0If a server says it want=
s to do bearer tokens and no TLS, is a client obligated to interop in order=
 to claim spec compliance?<div>

<br></div><div>--<br>John Panzer / Google<br><a href=3D"mailto:jpanzer@goog=
le.com" target=3D"_blank">jpanzer@google.com</a> / <a href=3D"http://abstra=
ctioneer.org" target=3D"_blank">abstractioneer.org</a> / @jpanzer<br> <br> =
<br>

<br><div class=3D"gmail_quote">On Fri, Jan 15, 2010 at 10:01 AM, Hurliman, =
John <span dir=3D"ltr">&lt;<a href=3D"mailto:john.hurliman@intel.com" targe=
t=3D"_blank">john.hurliman@intel.com</a>&gt;</span> wrote:<br><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">

 +1 to this as well. Any implementation is free to deviate from the spec, a=
t the risk of breaking interoperability.<br> <font color=3D"#888888"><br> J=
ohn<br> </font><div><div></div><div><br> -----Original Message-----<br> Fro=
m: <a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounce=
s@ietf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"=
_blank">oauth-bounces@ietf.org</a>] On Behalf Of John Panzer<br>

 Sent: Friday, January 15, 2010 8:43 AM<br> To: Eve Maler<br> Cc: OAuth WG<=
br> Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Cha=
nnels<br> <br> +1 to MUST implement TLS on both sides.<br> <br> I thought w=
e were only discussing whether the server could decide to<br>

 skip TLS for a particular use case. =A0No?<br> <br> On Friday, January 15,=
 2010, Eve Maler &lt;<a href=3D"mailto:eve@xmlgrrl.com" target=3D"_blank">e=
ve@xmlgrrl.com</a>&gt; wrote:<br> &gt; The points about matching security t=
o use case are excellent. =A0This is why I think we&#39;re maybe misinterpr=
eting Eran&#39;s argument for MUST. =A0It&#39;s not an argument from securi=
ty alone (&quot;we must always have highest security all the time&quot;); i=
t&#39;s an argument from interoperability of security features at Internet =
scale (&quot;in the general/at-scale case, we should not accept deployed in=
stances that do not support this important security feature&quot;).<br>

 &gt;<br> &gt; On this basis, it&#39;s reasonable to argue for MUST for imp=
lementing TLS (with no weasel words about &quot;or equivalent&quot;, since =
this isn&#39;t a testable protocol clause), for the broad ecosystem benefit=
s.<br>

 &gt;<br> &gt; =A0=A0 =A0 =A0 =A0Eve<br> &gt;<br> &gt; On 15 Jan 2010, at 8=
:06 AM, John Kemp wrote:<br> &gt;<br> &gt;&gt; On Jan 14, 2010, at 7:39 PM,=
 Richard L. Barnes wrote:<br> &gt;&gt;<br> &gt;&gt;&gt;&gt; As such, I can&=
#39;t see how *not* requiring SSL for unsigned requests<br>

 &gt;&gt;&gt;&gt; could pass muster at an IETF security review.<br> &gt;&gt=
;&gt;<br> &gt;&gt;&gt; Speaking as someone who does IETF security reviews .=
.. =A0:)<br> &gt;&gt;&gt;<br> &gt;&gt;&gt; If I were reviewing a document t=
hat defines an optional insecure mode of operation (in this case, operating=
 without TLS), I would be looking for basically two things: (1) A discussio=
n of the risks if the insecure mode is used, and (2) a motivation for why t=
hese risks might be acceptable in certain cases. =A0This is in the spirit o=
f &quot;MUST=3DSHOULD+exception&quot; -- if it&#39;s a SHOULD, you need to =
explain the exception. =A0In this case, the risks (1) are pretty obvious: A=
 passive observer can steal your password and use it to authenticate as you=
. =A0The motivations (2) are what this thread is about.<br>

 &gt;&gt;&gt;<br> &gt;&gt;&gt; I would also observe that &quot;MUST use TLS=
 or equivalent&quot; is actually the same as &quot;SHOULD use TLS&quot;, si=
nce the &quot;or equivalent&quot; isn&#39;t really specified.<br> &gt;&gt;<=
br>

 &gt;&gt; Right. Which is why I&#39;m currently OK with Eran&#39;s text eit=
her way as I think it allows bearer tokens with *any* other security protec=
tions, unless we specify exactly which security properties should be provid=
ed by the channel, vs. via other mechanisms.<br>

 &gt;&gt;<br> &gt;&gt; SAML&#39;s &quot;confirmation method&quot; is sort o=
f the equivalent idea to what we&#39;ve been talking about here (where the =
method could be &quot;holder-of-key+a signature algorithm&quot;, &quot;bear=
er&quot; or something else) but we also haven&#39;t separated out security =
properties such as integrity or confidentiality for the purposes of this di=
scussion.<br>

 &gt;&gt;<br> &gt;&gt;&gt; (This is really obvious when you think about it =
from the perspective of an implementor: If you&#39;re going to cover the &q=
uot;or equivalent&quot; cases, then you have to have be able to operate in =
non-TLS mode.) =A0The &quot;or equivalent&quot; cases are the ones where no=
t using TLS might be acceptable, i.e., the ones that should be cited as mot=
ivations (2) for allowing the non-secure mode.<br>

 &gt;&gt;&gt;<br> &gt;&gt;&gt; Taking the SECDIR hat off, it seems to me th=
at there are some motivations appearing in this thread:<br> &gt;&gt;&gt; --=
 Appropriate key management (frequent key refresh)<br> &gt;&gt;&gt; -- Priv=
ate trusted networks<br>

 &gt;&gt;&gt; -- John&#39;s observation that &quot;URL+token&quot; =3D=3D &=
quot;private URL&quot;<br> &gt;&gt;&gt; So ISTM that &quot;SHOULD use TLS&q=
uot; could be motivated here.<br> &gt;&gt;&gt;<br> &gt;&gt;&gt; (Now, all t=
hat said, it probably wouldn&#39;t hurt to have TLS as a &quot;MUST impleme=
nt&quot; so that it&#39;s there if people want to use it.)<br>

 &gt;&gt;<br> &gt;&gt; +1<br> &gt;&gt;<br> &gt;&gt; - johnk<br> &gt;<br> &g=
t;<br> &gt; Eve Maler<br> &gt; <a href=3D"mailto:eve@xmlgrrl.com" target=3D=
"_blank">eve@xmlgrrl.com</a><br> &gt; <a href=3D"http://www.xmlgrrl.com/blo=
g" target=3D"_blank">http://www.xmlgrrl.com/blog</a><br>

 &gt;<br> &gt; _______________________________________________<br> &gt; OAu=
th mailing list<br> &gt; <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank=
">OAuth@ietf.org</a><br> &gt; <a href=3D"https://www.ietf.org/mailman/listi=
nfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a=
><br>

 &gt;<br> <br> --<br> --<br> John Panzer / Google<br> <a href=3D"mailto:jpa=
nzer@google.com" target=3D"_blank">jpanzer@google.com</a> / <a href=3D"http=
://abstractioneer.org" target=3D"_blank">abstractioneer.org</a> / @jpanzer<=
br>
 _______________________________________________<br>
 OAuth mailing list<br> <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"=
>OAuth@ietf.org</a><br> <a href=3D"https://www.ietf.org/mailman/listinfo/oa=
uth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
_______________________________________________<br>

 OAuth mailing list<br> <a href=3D"mailto:OAuth@ietf.org" target=3D"_blank"=
>OAuth@ietf.org</a><br> <a href=3D"https://www.ietf.org/mailman/listinfo/oa=
uth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
</div>

</div></blockquote></div><br></div> _______________________________________=
________<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=
=3D"_blank">OAuth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/l=
istinfo/oauth" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oaut=
h</a><br>

</blockquote></div><br></div></div></div></div></div></blockquote></div><br=
>

--000e0cd72252db7513047d38e8c2--

From rbarnes@bbn.com  Fri Jan 15 11:58:32 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7315A3A685F for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 11:58:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.151
X-Spam-Level: 
X-Spam-Status: No, score=-2.151 tagged_above=-999 required=5 tests=[AWL=-0.359, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ktb16Csuinl0 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 11:58:30 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 6ADBB3A67AB for <oauth@ietf.org>; Fri, 15 Jan 2010 11:58:30 -0800 (PST)
Received: from ros-dhcp192-1-51-107.bbn.com ([192.1.51.107]) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1NVsJO-0005XV-C0; Fri, 15 Jan 2010 14:58:26 -0500
Message-Id: <8E6EDCB3-3EDE-4A2E-B29E-70FACF40BF0A@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: John Panzer <jpanzer@google.com>
In-Reply-To: <cb5f7a381001151121p71784a5cj5124f4b33f1f431a@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-17--337018778
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 15 Jan 2010 14:58:26 -0500
References: <C773F42D.2D07C%eran@hueniverse.com> <5EE8B4A7-B176-48C7-ADE1-E4C3D037B1A4@jkemp.net> <d37b4b431001140410h3bf7311di5793b652b0704ec9@mail.gmail.com> <4CD0B1FE-83DC-4C4F-9671-1A588F211A17@bbn.com> <AD976311-5F82-4FFC-A770-2FB0081C7DFA@jkemp.net> <5D0FB108-587F-485D-8FF1-6D256193C12C@xmlgrrl.com> <cb5f7a381001150842q3406d634j16dd9411834d2532@mail.gmail.com> <62BFE5680C037E4DA0B0A08946C0933DC486ED19@rrsmsx506.amr.corp.intel.com> <cb5f7a381001151029w31bc5788kd8033a0fdec5a48@mail.gmail.com> <32D388A4-C38A-4A1B-9F2D-1EE183E1227C@bbn.com> <cb5f7a381001151121p71784a5cj5124f4b33f1f431a@mail.gmail.com>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 19:58:32 -0000

--Apple-Mail-17--337018778
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed;
	delsp=yes
Content-Transfer-Encoding: 7bit

If the issue is that the client doesn't *want* to do PLAINTEXT-NOTLS,  
then there is no interop issue -- the client and the server have  
different requirements, at a policy level. You can have a requirement  
for compliant implementations to implement the mode, but you can't  
force people to use it.  This remains true even if you do have a  
algorithm negotiation mechanism.

Two analogies:

1. HTTP: If I enter an HTTPS URI and and the server returns a 301  
sending me  to an HTTP URI, then I don't follow it to the insecure  
site in order to comply with HTTP (even though my browser usually does  
so automatically).

2. IPsec: If two IKE peers are trying to set up an IPsec security  
association, first one peer advertises the list of algorithms it's  
willing to use, then the second peer responds with the subset of those  
that it's willing to use.  If the second peer doesn't like any of the  
advertised algorithms, then it says so, and the negotiation fails.

--Richard



On Jan 15, 2010, at 2:21 PM, John Panzer wrote:

> On Fri, Jan 15, 2010 at 10:41 AM, Richard L. Barnes  
> <rbarnes@bbn.com> wrote:
> I would think not; it's a matter of the client's policy what  
> signatures it will issue, and the server's policy which it will  
> accept.
>
> That doesn't answer the interop question, though, which is the  
> interesting one from the standpoint of the spec.  If there is no  
> requirement for a common minimal-subset then there is no guarantee  
> of interop between a random client and a random server that both  
> speak the same data protocol.  Most use cases of OAuth have a custom  
> client for every data API so this isn't an issue, but that's not  
> necessarily the case, especially as new protocols start to depend on  
> OAuth for their security needs.
>
>
> And in any case, OAuth doesn't have any in-band security  
> negotiation, so there's no way for the server to ask for a given set  
> of features (e.g., bearer tokens and no TLS) within the protocol.
>
>
> See however https://groups.google.com/group/oauth-key-discovery for  
> a very needed extension that does add key discovery and rotation.   
> Even without that, the question is just punted to the out of band  
> documentation:  Is a server allowed to support only bearer tokens  
> and no TLS for some use case?
>
>
>
> --Richard
>
>
>
>
> On Jan 15, 2010, at 1:29 PM, John Panzer wrote:
>
>> I think the question at hand is:  If a server says it wants to do  
>> bearer tokens and no TLS, is a client obligated to interop in order  
>> to claim spec compliance?
>>
>> --
>> John Panzer / Google
>> jpanzer@google.com / abstractioneer.org / @jpanzer
>>
>>
>>
>> On Fri, Jan 15, 2010 at 10:01 AM, Hurliman, John <john.hurliman@intel.com 
>> > wrote:
>> +1 to this as well. Any implementation is free to deviate from the  
>> spec, at the risk of breaking interoperability.
>>
>> John
>>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On  
>> Behalf Of John Panzer
>> Sent: Friday, January 15, 2010 8:43 AM
>> To: Eve Maler
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure  
>> Channels
>>
>> +1 to MUST implement TLS on both sides.
>>
>> I thought we were only discussing whether the server could decide to
>> skip TLS for a particular use case.  No?
>>
>> On Friday, January 15, 2010, Eve Maler <eve@xmlgrrl.com> wrote:
>> > The points about matching security to use case are excellent.   
>> This is why I think we're maybe misinterpreting Eran's argument for  
>> MUST.  It's not an argument from security alone ("we must always  
>> have highest security all the time"); it's an argument from  
>> interoperability of security features at Internet scale ("in the  
>> general/at-scale case, we should not accept deployed instances that  
>> do not support this important security feature").
>> >
>> > On this basis, it's reasonable to argue for MUST for implementing  
>> TLS (with no weasel words about "or equivalent", since this isn't a  
>> testable protocol clause), for the broad ecosystem benefits.
>> >
>> >         Eve
>> >
>> > On 15 Jan 2010, at 8:06 AM, John Kemp wrote:
>> >
>> >> On Jan 14, 2010, at 7:39 PM, Richard L. Barnes wrote:
>> >>
>> >>>> As such, I can't see how *not* requiring SSL for unsigned  
>> requests
>> >>>> could pass muster at an IETF security review.
>> >>>
>> >>> Speaking as someone who does IETF security reviews ...  :)
>> >>>
>> >>> If I were reviewing a document that defines an optional  
>> insecure mode of operation (in this case, operating without TLS), I  
>> would be looking for basically two things: (1) A discussion of the  
>> risks if the insecure mode is used, and (2) a motivation for why  
>> these risks might be acceptable in certain cases.  This is in the  
>> spirit of "MUST=SHOULD+exception" -- if it's a SHOULD, you need to  
>> explain the exception.  In this case, the risks (1) are pretty  
>> obvious: A passive observer can steal your password and use it to  
>> authenticate as you.  The motivations (2) are what this thread is  
>> about.
>> >>>
>> >>> I would also observe that "MUST use TLS or equivalent" is  
>> actually the same as "SHOULD use TLS", since the "or equivalent"  
>> isn't really specified.
>> >>
>> >> Right. Which is why I'm currently OK with Eran's text either way  
>> as I think it allows bearer tokens with *any* other security  
>> protections, unless we specify exactly which security properties  
>> should be provided by the channel, vs. via other mechanisms.
>> >>
>> >> SAML's "confirmation method" is sort of the equivalent idea to  
>> what we've been talking about here (where the method could be  
>> "holder-of-key+a signature algorithm", "bearer" or something else)  
>> but we also haven't separated out security properties such as  
>> integrity or confidentiality for the purposes of this discussion.
>> >>
>> >>> (This is really obvious when you think about it from the  
>> perspective of an implementor: If you're going to cover the "or  
>> equivalent" cases, then you have to have be able to operate in non- 
>> TLS mode.)  The "or equivalent" cases are the ones where not using  
>> TLS might be acceptable, i.e., the ones that should be cited as  
>> motivations (2) for allowing the non-secure mode.
>> >>>
>> >>> Taking the SECDIR hat off, it seems to me that there are some  
>> motivations appearing in this thread:
>> >>> -- Appropriate key management (frequent key refresh)
>> >>> -- Private trusted networks
>> >>> -- John's observation that "URL+token" == "private URL"
>> >>> So ISTM that "SHOULD use TLS" could be motivated here.
>> >>>
>> >>> (Now, all that said, it probably wouldn't hurt to have TLS as a  
>> "MUST implement" so that it's there if people want to use it.)
>> >>
>> >> +1
>> >>
>> >> - johnk
>> >
>> >
>> > Eve Maler
>> > eve@xmlgrrl.com
>> > http://www.xmlgrrl.com/blog
>> >
>> > _______________________________________________
>> > OAuth mailing list
>> > OAuth@ietf.org
>> > https://www.ietf.org/mailman/listinfo/oauth
>> >
>>
>> --
>> --
>> John Panzer / Google
>> jpanzer@google.com / abstractioneer.org / @jpanzer
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>
>


--Apple-Mail-17--337018778
Content-Type: text/html;
	charset=US-ASCII
Content-Transfer-Encoding: quoted-printable

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space; "><div>If the issue is that the =
client doesn't *want* to do PLAINTEXT-NOTLS, then there is no interop =
issue -- the client and the server have different requirements, at a =
policy level. You can have a requirement for compliant implementations =
to implement the mode, but you can't force people to use it. &nbsp;This =
remains true even if you do have a algorithm negotiation =
mechanism.</div><div><br></div><div>Two analogies: =
&nbsp;</div><div><br></div><div>1. HTTP: If I enter an HTTPS URI and and =
the server returns a 301 sending me &nbsp;to an HTTP URI, then I don't =
follow it to the insecure site in order to comply with HTTP (even though =
my browser usually does so automatically).</div><div><br></div><div>2. =
IPsec: If two IKE peers are trying to set up an IPsec security =
association, first one peer advertises the list of algorithms it's =
willing to use, then the second peer responds with the subset of those =
that it's willing to use. &nbsp;If the second peer doesn't like any of =
the advertised algorithms, then it says so, and the negotiation =
fails.</div><div><br></div><div>--Richard</div><div><br></div><div><br></d=
iv><br><div><div>On Jan 15, 2010, at 2:21 PM, John Panzer =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div class=3D"gmail_quote">On Fri, Jan 15, 2010 at 10:41 =
AM, Richard L. Barnes <span dir=3D"ltr">&lt;<a =
href=3D"mailto:rbarnes@bbn.com">rbarnes@bbn.com</a>&gt;</span> =
wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex;"> <div =
style=3D"word-wrap:break-word">I would think not; it's a matter of the =
client's policy what signatures it will issue, and the server's policy =
which it will accept.</div></blockquote><div><br></div><div>That doesn't =
answer the interop question, though, which is the interesting one from =
the standpoint of the spec. &nbsp;If there is no requirement for a =
common minimal-subset then there is no guarantee of interop between a =
random client and a random server that both speak the same data =
protocol. &nbsp;Most use cases of OAuth have a custom client for every =
data API so this isn't an issue, but that's not necessarily the case, =
especially as new protocols start to depend on OAuth for their security =
needs.</div> <div>&nbsp;</div><blockquote class=3D"gmail_quote" =
style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex;"><div =
style=3D"word-wrap:break-word"><div><br></div><div>And in any case, =
OAuth doesn't have any in-band security negotiation, so there's no way =
for the server to ask for a given set of features (e.g., bearer tokens =
and no TLS) within the protocol.&nbsp;</div> =
<div><br></div></div></blockquote><div><br></div><div>See =
however&nbsp;<a =
href=3D"https://groups.google.com/group/oauth-key-discovery">https://group=
s.google.com/group/oauth-key-discovery</a> for a very needed extension =
that does add key discovery and rotation. &nbsp;Even without that, the =
question is just punted to the out of band documentation: &nbsp;Is a =
server allowed to support only bearer tokens and no TLS for some use =
case?</div> <div><br></div><div><br></div><div><br></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc =
solid;padding-left:1ex;"><div =
style=3D"word-wrap:break-word"><div></div><div><font =
color=3D"#888888">--Richard</font><div> <div></div><div =
class=3D"h5"><br><div><br></div><div><br></div><div><br><div><div>On Jan =
15, 2010, at 1:29 PM, John Panzer wrote:</div><br><blockquote =
type=3D"cite">I think the question at hand is: &nbsp;If a server says it =
wants to do bearer tokens and no TLS, is a client obligated to interop =
in order to claim spec compliance?<div> <br></div><div>--<br>John Panzer =
/ Google<br><a href=3D"mailto:jpanzer@google.com" =
target=3D"_blank">jpanzer@google.com</a> / <a =
href=3D"http://abstractioneer.org" =
target=3D"_blank">abstractioneer.org</a> / @jpanzer<br> <br> <br> =
<br><div class=3D"gmail_quote">On Fri, Jan 15, 2010 at 10:01 AM, =
Hurliman, John <span dir=3D"ltr">&lt;<a =
href=3D"mailto:john.hurliman@intel.com" =
target=3D"_blank">john.hurliman@intel.com</a>&gt;</span> =
wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 =
.8ex;border-left:1px #ccc solid;padding-left:1ex">  +1 to this as well. =
Any implementation is free to deviate from the spec, at the risk of =
breaking interoperability.<br> <font color=3D"#888888"><br> John<br> =
</font><div><div></div><div><br> -----Original Message-----<br> From: <a =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a> [mailto:<a =
href=3D"mailto:oauth-bounces@ietf.org" =
target=3D"_blank">oauth-bounces@ietf.org</a>] On Behalf Of John =
Panzer<br>  Sent: Friday, January 15, 2010 8:43 AM<br> To: Eve Maler<br> =
Cc: OAuth WG<br> Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear =
Over Insecure Channels<br> <br> +1 to MUST implement TLS on both =
sides.<br> <br> I thought we were only discussing whether the server =
could decide to<br>  skip TLS for a particular use case. &nbsp;No?<br> =
<br> On Friday, January 15, 2010, Eve Maler &lt;<a =
href=3D"mailto:eve@xmlgrrl.com" target=3D"_blank">eve@xmlgrrl.com</a>&gt; =
wrote:<br> &gt; The points about matching security to use case are =
excellent. &nbsp;This is why I think we're maybe misinterpreting Eran's =
argument for MUST. &nbsp;It's not an argument from security alone ("we =
must always have highest security all the time"); it's an argument from =
interoperability of security features at Internet scale ("in the =
general/at-scale case, we should not accept deployed instances that do =
not support this important security feature").<br>  &gt;<br> &gt; On =
this basis, it's reasonable to argue for MUST for implementing TLS (with =
no weasel words about "or equivalent", since this isn't a testable =
protocol clause), for the broad ecosystem benefits.<br>  &gt;<br> &gt; =
&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;Eve<br> &gt;<br> &gt; On 15 Jan 2010, =
at 8:06 AM, John Kemp wrote:<br> &gt;<br> &gt;&gt; On Jan 14, 2010, at =
7:39 PM, Richard L. Barnes wrote:<br> &gt;&gt;<br> &gt;&gt;&gt;&gt; As =
such, I can't see how *not* requiring SSL for unsigned requests<br>  =
&gt;&gt;&gt;&gt; could pass muster at an IETF security review.<br> =
&gt;&gt;&gt;<br> &gt;&gt;&gt; Speaking as someone who does IETF security =
reviews ... &nbsp;:)<br> &gt;&gt;&gt;<br> &gt;&gt;&gt; If I were =
reviewing a document that defines an optional insecure mode of operation =
(in this case, operating without TLS), I would be looking for basically =
two things: (1) A discussion of the risks if the insecure mode is used, =
and (2) a motivation for why these risks might be acceptable in certain =
cases. &nbsp;This is in the spirit of "MUST=3DSHOULD+exception" -- if =
it's a SHOULD, you need to explain the exception. &nbsp;In this case, =
the risks (1) are pretty obvious: A passive observer can steal your =
password and use it to authenticate as you. &nbsp;The motivations (2) =
are what this thread is about.<br>  &gt;&gt;&gt;<br> &gt;&gt;&gt; I =
would also observe that "MUST use TLS or equivalent" is actually the =
same as "SHOULD use TLS", since the "or equivalent" isn't really =
specified.<br> &gt;&gt;<br>  &gt;&gt; Right. Which is why I'm currently =
OK with Eran's text either way as I think it allows bearer tokens with =
*any* other security protections, unless we specify exactly which =
security properties should be provided by the channel, vs. via other =
mechanisms.<br>  &gt;&gt;<br> &gt;&gt; SAML's "confirmation method" is =
sort of the equivalent idea to what we've been talking about here (where =
the method could be "holder-of-key+a signature algorithm", "bearer" or =
something else) but we also haven't separated out security properties =
such as integrity or confidentiality for the purposes of this =
discussion.<br>  &gt;&gt;<br> &gt;&gt;&gt; (This is really obvious when =
you think about it from the perspective of an implementor: If you're =
going to cover the "or equivalent" cases, then you have to have be able =
to operate in non-TLS mode.) &nbsp;The "or equivalent" cases are the =
ones where not using TLS might be acceptable, i.e., the ones that should =
be cited as motivations (2) for allowing the non-secure mode.<br>  =
&gt;&gt;&gt;<br> &gt;&gt;&gt; Taking the SECDIR hat off, it seems to me =
that there are some motivations appearing in this thread:<br> =
&gt;&gt;&gt; -- Appropriate key management (frequent key refresh)<br> =
&gt;&gt;&gt; -- Private trusted networks<br>  &gt;&gt;&gt; -- John's =
observation that "URL+token" =3D=3D "private URL"<br> &gt;&gt;&gt; So =
ISTM that "SHOULD use TLS" could be motivated here.<br> &gt;&gt;&gt;<br> =
&gt;&gt;&gt; (Now, all that said, it probably wouldn't hurt to have TLS =
as a "MUST implement" so that it's there if people want to use it.)<br>  =
&gt;&gt;<br> &gt;&gt; +1<br> &gt;&gt;<br> &gt;&gt; - johnk<br> &gt;<br> =
&gt;<br> &gt; Eve Maler<br> &gt; <a href=3D"mailto:eve@xmlgrrl.com" =
target=3D"_blank">eve@xmlgrrl.com</a><br> &gt; <a =
href=3D"http://www.xmlgrrl.com/blog" =
target=3D"_blank">http://www.xmlgrrl.com/blog</a><br>  &gt;<br> &gt; =
_______________________________________________<br> &gt; OAuth mailing =
list<br> &gt; <a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br> &gt; <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>  =
&gt;<br> <br> --<br> --<br> John Panzer / Google<br> <a =
href=3D"mailto:jpanzer@google.com" =
target=3D"_blank">jpanzer@google.com</a> / <a =
href=3D"http://abstractioneer.org" =
target=3D"_blank">abstractioneer.org</a> / @jpanzer<br> =
_______________________________________________<br> OAuth mailing =
list<br> <a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br> <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
_______________________________________________<br>  OAuth mailing =
list<br> <a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br> <a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
</div> </div></blockquote></div><br></div> =
_______________________________________________<br>OAuth mailing =
list<br><a href=3D"mailto:OAuth@ietf.org" =
target=3D"_blank">OAuth@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/oauth" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br> =
</blockquote></div><br></div></div></div></div></div></blockquote></div><b=
r></blockquote></div><br></body></html>=

--Apple-Mail-17--337018778--

From stpeter@stpeter.im  Fri Jan 15 13:42:10 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A67FA3A6784 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 13:42:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.849
X-Spam-Level: 
X-Spam-Status: No, score=-2.849 tagged_above=-999 required=5 tests=[AWL=-0.250, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lCVCPoIkM-fu for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 13:42:09 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id DA2CE3A69A7 for <oauth@ietf.org>; Fri, 15 Jan 2010 13:42:03 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 2CFE140D1C; Fri, 15 Jan 2010 14:42:00 -0700 (MST)
Message-ID: <4B50E126.2070303@stpeter.im>
Date: Fri, 15 Jan 2010 14:41:58 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <C773F5CB.2D080%eran@hueniverse.com>
In-Reply-To: <C773F5CB.2D080%eran@hueniverse.com>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms050203000806020902060509"
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Setting Course
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 21:42:10 -0000

This is a cryptographically signed message in MIME format.

--------------ms050203000806020902060509
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 1/13/10 11:12 PM, Eran Hammer-Lahav wrote:
>=20
> On 1/13/10 6:17 PM, "Peter Saint-Andre" <stpeter@stpeter.im> wrote:
>=20
>>> These drafts will be locked before the WG meeting to allow review and=
 will
>>> be discussed at the meeting. We will also discuss any charter changes=

>>> required to accommodate the drafts. This approach will allow us to fo=
cus on
>>> the work and worry about the charter at the meeting. This will ensure=
 we
>>> ground the process in actual technical consensus.
>>
>> That approach sounds quite reasonable. Two comments:
>>
>> a. In my opinion the scenarios are not limited to what has been
>> introduced by the WRAP discussions, and I have been encouraging folks =
to
>> submit I-Ds that document additional scenarios as input to our
>> understanding of the problem space (the WRAP authors will submit their=

>> work soon, as well).
>=20
> Exactly. That's why I asked if there are additional ones to add. But I =
think
> it is important the people will read the WRAP scenarios before spending=
 time
> in writing new I-Ds to see if their *use-case* is already covered. If i=
t is,
> but is not solved to their satisfaction, I think that should be posted =
as
> feedback to the WRAP proposal and not as yet another I-D.

Indeed. My sense from talking with some folks one-on-one is that there
are additional scenarios, and I'm encouraging those people to contribute
scenarios on the list or via I-D.

>> b. Once we have a clear grasp of the problem space, we'll be able to
>> make longer-lasting progress on solutions. As you have outlined, at a
>> high level the solutions are how to make authenticated requests and ho=
w
>> to obtain credentials for making such requests, but it seems to me tha=
t
>> there's still quite a bit of work to be done in figuring out what's
>> "core" to those solutions and what needs to go in various extensions.
>=20
> This is true for the authorization part, but I don't think it is true f=
or
> the authentication part. On the authentication side I think we are very=

> close to a proposal. I have followed up with a few open questions and w=
ill
> send more over the next few days.
>=20
> I think we can get the authentication part mostly done quickly, and the=
n put
> it aside to focus on the authorization, going back to make changes as
> limitations or issues are found based on the authorization experience.

Iterative development is good. :) That sounds quite reasonable.

>> Blaine and I will send out a rough agenda tomorrow for our first
>> conference call on the 21st.

Sorry we haven't sent it yet -- we're working on it now...

> Great. I will not be able to attend but hopefully others will and repor=
t
> back with new ideas and feedback.

Sorry to hear that. Hopefully you'll be able to join future calls.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms050203000806020902060509
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms050203000806020902060509--

From eran@hueniverse.com  Fri Jan 15 13:42:10 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D5AF83A69A0 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 13:42:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.478
X-Spam-Level: 
X-Spam-Status: No, score=-2.478 tagged_above=-999 required=5 tests=[AWL=0.121,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WlNnGhlDkcJO for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 13:42:09 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 89E4C3A6986 for <oauth@ietf.org>; Fri, 15 Jan 2010 13:42:04 -0800 (PST)
Received: (qmail 1960 invoked from network); 15 Jan 2010 21:42:01 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 15 Jan 2010 21:42:01 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 15 Jan 2010 14:41:56 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Fri, 15 Jan 2010 14:41:52 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqV+5MrmGX6hyjWR6mWqUErIJtuNQAL/ltu
Message-ID: <C7762120.2D175%eran@hueniverse.com>
In-Reply-To: <CF19B7F9-6C94-4728-8F25-64C25471523E@jkemp.net>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 21:42:11 -0000

On 1/15/10 7:58 AM, "John Kemp" <john@jkemp.net> wrote:

> When I look at what is possible in the offline world, I would ask - would=
 you
> require that movie theatre tickets bought in advance were encrypted in
> transport between the person who bought the ticket and the receptionist a=
t the
> cinema? What if the person drops her ticket and it's picked up by someone
> else? The risk of someone dropping his ticket is low, so we don't bother =
to
> secure it (of course, I haven't been to a city movie theatre in years so
> perhaps you need to show ID even to see a movie these days -- I hope not =
;) Of
> course, the person who _does_ drop his ticket will be mad when he gets to=
 the
> movie theatre, but probably not too mad. The system has worked quite well
> without any real security. We might add more security, but it would, even
> today, probably be hard to justify the cost.

I don't think this is a fair comparison. Stealing a movie ticket is very
hard, and punishable but fines and prison time (potentially federal is
captured in transit via US Mail). On the other hand, capturing bearer token=
s
while sitting at a Starbucks using nothing more than a laptop with a WiFi
card is trivial.
=20
> Yes, those things change over time, but having a sliding scale of securit=
y is
> a good thing, not a bad thing - and that is already allowed by OAuth toda=
y,
> (TLS/SSL+PLAINTEXT, RSA-SHA1, HMAC-SHA1, PLAINTEXT) and will continue eve=
n if
> you remove PLAINTEXT from the list.

We are creating web standards, not just generic technologies. I don't want
to find *any* PLAINTEXT implementation on the web, but don't care if someon=
e
uses it on their own private network. But if that's what they are doing,
they are free to drop TLS/SSL requirement anyway because they control the
environment.

Since we are talking about one word, MUST vs. SHOULD, I think we should
start with MUST and continue having this discussion when we have more piece=
s
of the puzzle in place.

EHL


From eran@hueniverse.com  Fri Jan 15 13:50:04 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 12AA33A6784 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 13:50:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.489
X-Spam-Level: 
X-Spam-Status: No, score=-2.489 tagged_above=-999 required=5 tests=[AWL=0.110,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IlibTOrx0qkE for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 13:50:03 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 5D8F73A67AE for <oauth@ietf.org>; Fri, 15 Jan 2010 13:50:03 -0800 (PST)
Received: (qmail 10034 invoked from network); 15 Jan 2010 21:50:00 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 15 Jan 2010 21:50:00 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 15 Jan 2010 14:50:00 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: John Panzer <jpanzer@google.com>
Date: Fri, 15 Jan 2010 14:49:56 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqWEMw8D0UI7LdiRxOlNXf8O1OdfgAG+Dbu
Message-ID: <C7762304.2D17C%eran@hueniverse.com>
In-Reply-To: <cb5f7a381001151029w31bc5788kd8033a0fdec5a48@mail.gmail.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 21:50:04 -0000

On 1/15/10 10:29 AM, "John Panzer" <jpanzer@google.com> wrote:

> I think the question at hand is: =A0If a server says it wants to do beare=
r
> tokens and no TLS, is a client obligated to interop in order to claim spe=
c
> compliance?

Its a tricky question because HTTPS is not a parameter or extension you
negotiate. It is dictated by the URI of the protected resource you are
trying to access, and clients should never assume that the http:// resource
is the same as the https:// resource, just with more/less security.

EHL


From john@jkemp.net  Fri Jan 15 14:02:47 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C04C93A6880 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:02:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.198
X-Spam-Level: 
X-Spam-Status: No, score=-2.198 tagged_above=-999 required=5 tests=[AWL=0.067,  BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id prr7e7iB3JVc for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:02:47 -0800 (PST)
Received: from outbound-mail-01.bluehost.com (outbound-mail-01.bluehost.com [69.89.21.11]) by core3.amsl.com (Postfix) with SMTP id CC5E53A67FD for <oauth@ietf.org>; Fri, 15 Jan 2010 14:02:46 -0800 (PST)
Received: (qmail 29754 invoked by uid 0); 15 Jan 2010 22:02:43 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy4.bluehost.com with SMTP; 15 Jan 2010 22:02:43 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=OoJTSc8vy6b4zCL8K03h30uot2j+Tis0Ptw/OQ3VsplzB7o75cSd/GkySaoIk8qExhbu12v+HDA+coPl3NCz2/GjRY0AolJzGXX630qEkT4zspRAMLs+c1DUUzFPBmJ9;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVuFf-0005XD-C2; Fri, 15 Jan 2010 15:02:43 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <C7762120.2D175%eran@hueniverse.com>
Date: Fri, 15 Jan 2010 17:02:41 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <DCE1689A-1C25-4A61-B4E6-DE1F064049F8@jkemp.net>
References: <C7762120.2D175%eran@hueniverse.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 22:02:47 -0000

Hello Eran,

On Jan 15, 2010, at 4:41 PM, Eran Hammer-Lahav wrote:

>=20
> On 1/15/10 7:58 AM, "John Kemp" <john@jkemp.net> wrote:
>=20
>> When I look at what is possible in the offline world, I would ask - =
would you
>> require that movie theatre tickets bought in advance were encrypted =
in
>> transport between the person who bought the ticket and the =
receptionist at the
>> cinema? What if the person drops her ticket and it's picked up by =
someone
>> else? The risk of someone dropping his ticket is low, so we don't =
bother to
>> secure it (of course, I haven't been to a city movie theatre in years =
so
>> perhaps you need to show ID even to see a movie these days -- I hope =
not ;) Of
>> course, the person who _does_ drop his ticket will be mad when he =
gets to the
>> movie theatre, but probably not too mad. The system has worked quite =
well
>> without any real security. We might add more security, but it would, =
even
>> today, probably be hard to justify the cost.
>=20
> I don't think this is a fair comparison. Stealing a movie ticket is =
very
> hard, and punishable but fines and prison time (potentially federal is
> captured in transit via US Mail).

The point is that the overall system makes the cost of providing any =
extra security not very worthwhile, as most thieves aren't that =
interested in stealing movie tickets, and most people don't lose their =
tickets!

> On the other hand, capturing bearer tokens
> while sitting at a Starbucks using nothing more than a laptop with a =
WiFi
> card is trivial.

Why would someone bother to sit and capture bearer tokens - what is the =
value of doing that, and what is the actual risk? In some cases, =
probably not that great... Imagine that we have an online movie bearer =
token - it's one-time use + replay-protected and gets delivered to the =
original requester after that entity has been authenticated (and is =
delivered over SSL). Now your thief has to grab that token as it is sent =
over the wire and somehow send it himself before the first request (by =
the lawfully-authorized viewer) is processed by the server! I think this =
is hard too - not impossible, but hard enough that for low-value cases, =
I simply wouldn't worry too much about encrypting that initial request =
(although of course, the movie stream itself would be DRMed!).=20

>=20
>> Yes, those things change over time, but having a sliding scale of =
security is
>> a good thing, not a bad thing - and that is already allowed by OAuth =
today,
>> (TLS/SSL+PLAINTEXT, RSA-SHA1, HMAC-SHA1, PLAINTEXT) and will continue =
even if
>> you remove PLAINTEXT from the list.
>=20
> We are creating web standards, not just generic technologies. I don't =
want
> to find *any* PLAINTEXT implementation on the web, but don't care if =
someone
> uses it on their own private network. But if that's what they are =
doing,
> they are free to drop TLS/SSL requirement anyway because they control =
the
> environment.
>=20
> Since we are talking about one word, MUST vs. SHOULD, I think we =
should
> start with MUST and continue having this discussion when we have more =
pieces
> of the puzzle in place.

I think you've raised a valid issue, but I don't yet hear any consensus =
about this change, or whether the suggested text actually does what we =
want. I hope you'll consider that (and perhaps wait a bit longer to make =
such a change).

Cheers,

- johnk



From eran@hueniverse.com  Fri Jan 15 14:15:20 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1CAFF3A6880 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:15:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.498
X-Spam-Level: 
X-Spam-Status: No, score=-2.498 tagged_above=-999 required=5 tests=[AWL=0.101,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AJjrDQ7CnkwQ for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:15:19 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 03DF23A67E5 for <oauth@ietf.org>; Fri, 15 Jan 2010 14:15:18 -0800 (PST)
Received: (qmail 21897 invoked from network); 15 Jan 2010 22:15:16 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 15 Jan 2010 22:15:16 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 15 Jan 2010 15:15:16 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: John Kemp <john@jkemp.net>
Date: Fri, 15 Jan 2010 15:15:13 -0700
Thread-Topic: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
Thread-Index: AcqWLnerrSKN1SExTLCqFPsopiKSFAAAb2dS
Message-ID: <C77628F1.2D183%eran@hueniverse.com>
In-Reply-To: <DCE1689A-1C25-4A61-B4E6-DE1F064049F8@jkemp.net>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 22:15:20 -0000

On 1/15/10 2:02 PM, "John Kemp" <john@jkemp.net> wrote:

> Why would someone bother to sit and capture bearer tokens - what is the v=
alue
> of doing that, and what is the actual risk? In some cases, probably not t=
hat
> great...

It would be great if the WRAP authors can share with us how their employers
plan to deploy their protocol. We have three major companies involved in
developing WRAP and they created a solution that can create severe security
risks. I am not aware of any APIs from MS, Y!, or Google that I would be
happy to use if they used bearer token without channel security.

> I think you've raised a valid issue, but I don't yet hear any consensus a=
bout
> this change, or whether the suggested text actually does what we want. I =
hope
> you'll consider that (and perhaps wait a bit longer to make such a change=
).

I agree, which is why I didn't want to paint this as a decided issue, just
that we might need more context to reach consensus and I need to put
something in the spec. My proposal is to be more restrictive and loosen it
later instead of the other way around.

EHL


From stpeter@stpeter.im  Fri Jan 15 14:42:44 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C97953A6828 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:42:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.821
X-Spam-Level: 
X-Spam-Status: No, score=-2.821 tagged_above=-999 required=5 tests=[AWL=-0.222, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gCV+WT+15MP6 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:42:44 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id D1AD93A6827 for <oauth@ietf.org>; Fri, 15 Jan 2010 14:42:43 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 611C140D1C for <oauth@ietf.org>; Fri, 15 Jan 2010 15:42:40 -0700 (MST)
Message-ID: <4B50EF5D.4020303@stpeter.im>
Date: Fri, 15 Jan 2010 15:42:37 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms020408000002020208030202"
Subject: [OAUTH-WG] Fwd: I-D Action:draft-hardt-oauth-01.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 22:42:44 -0000

This is a cryptographically signed message in MIME format.

--------------ms020408000002020208030202
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

FYI. Thanks to Dick for submitting this!

/psa

-------- Original Message --------
Subject: I-D Action:draft-hardt-oauth-01.txt
Date: Fri, 15 Jan 2010 14:15:02 -0800 (PST)
From: Internet-Drafts@ietf.org
Reply-To: internet-drafts@ietf.org
To: i-d-announce@ietf.org

A New Internet-Draft is available from the on-line Internet-Drafts
directories.

	Title           : OAuth Web Resource Authorization Profiles
	Author(s)       : D. Hardt, et al.
	Filename        : draft-hardt-oauth-01.txt
	Pages           : 40
	Date            : 2010-01-15

The OAuth Web Resource Authorization Profiles (OAuth WRAP) allow a
server hosting a Protected Resource to delegate authorization to one
or more authorities.  An application (Client) accesses the Protected
Resource by presenting a short lived, opaque, bearer token (Access
Token) obtained from an authority (Authorization Server).  There are
Profiles for how a Client may obtain an Access Token when acting
autonomously or on behalf of a User.

Status of this Memo

This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups.  Note that
other groups may also distribute working documents as Internet-
Drafts.

Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time.  It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."

The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.

This Internet-Draft will expire on July 19, 2010.

Copyright Notice
Copyright (c) 2010 IETF Trust and the persons identified as the
document authors.  All rights reserved.

This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document.  Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.  Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the BSD License.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-hardt-oauth-01.txt



--------------ms020408000002020208030202
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms020408000002020208030202--

From email@pbryan.net  Fri Jan 15 14:49:55 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AC0843A6848 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:49:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.312
X-Spam-Level: 
X-Spam-Status: No, score=-2.312 tagged_above=-999 required=5 tests=[AWL=0.287,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uGwFLdJJ8ZXO for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:49:54 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id B54CD3A683C for <oauth@ietf.org>; Fri, 15 Jan 2010 14:49:54 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id 3B116EA022 for <oauth@ietf.org>; Fri, 15 Jan 2010 22:49:51 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <C7762120.2D175%eran@hueniverse.com>
References: <C7762120.2D175%eran@hueniverse.com>
Content-Type: text/plain; charset="UTF-8"
Date: Fri, 15 Jan 2010 14:49:45 -0800
Message-ID: <1263595785.551.3.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 22:49:55 -0000

On Fri, 2010-01-15 at 14:41 -0700, Eran Hammer-Lahav wrote:
> 
> 
> On 1/15/10 7:58 AM, "John Kemp" <john@jkemp.net> wrote:
> 
> > When I look at what is possible in the offline world, I would ask - would you
> > require that movie theatre tickets bought in advance were encrypted in
> > transport between the person who bought the ticket and the receptionist at the
> > cinema? What if the person drops her ticket and it's picked up by someone
> > else? The risk of someone dropping his ticket is low, so we don't bother to
> > secure it (of course, I haven't been to a city movie theatre in years so
> > perhaps you need to show ID even to see a movie these days -- I hope not ;) Of
> > course, the person who _does_ drop his ticket will be mad when he gets to the
> > movie theatre, but probably not too mad. The system has worked quite well
> > without any real security. We might add more security, but it would, even
> > today, probably be hard to justify the cost.
> 
> I don't think this is a fair comparison. Stealing a movie ticket is very
> hard, and punishable but fines and prison time (potentially federal is
> captured in transit via US Mail). On the other hand, capturing bearer tokens
> while sitting at a Starbucks using nothing more than a laptop with a WiFi
> card is trivial.
>  
> > Yes, those things change over time, but having a sliding scale of security is
> > a good thing, not a bad thing - and that is already allowed by OAuth today,
> > (TLS/SSL+PLAINTEXT, RSA-SHA1, HMAC-SHA1, PLAINTEXT) and will continue even if
> > you remove PLAINTEXT from the list.
> 
> We are creating web standards, not just generic technologies. I don't want
> to find *any* PLAINTEXT implementation on the web, but don't care if someone
> uses it on their own private network. But if that's what they are doing,
> they are free to drop TLS/SSL requirement anyway because they control the
> environment.

I'm in 100% agreement on this point if the MUST is constrained to limit
only non-encrypted PLAINTEXT implementations on the web.

> Since we are talking about one word, MUST vs. SHOULD, I think we should
> start with MUST and continue having this discussion when we have more pieces
> of the puzzle in place.
> 
> EHL
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From faynberg@alcatel-lucent.com  Fri Jan 15 14:57:07 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 787CE3A6988 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:57:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[AWL=-0.099, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bmwi2yp0ppIY for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 14:57:06 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id 7EBF93A6982 for <oauth@ietf.org>; Fri, 15 Jan 2010 14:57:05 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id o0FMv0Kg002179 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 15 Jan 2010 16:57:00 -0600 (CST)
Received: from [135.244.38.97] (faynberg.lra.lucent.com [135.244.38.97]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0FMuxLr017563; Fri, 15 Jan 2010 16:56:59 -0600 (CST)
Message-ID: <4B50F2BD.8030104@alcatel-lucent.com>
Date: Fri, 15 Jan 2010 17:57:01 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <C7762120.2D175%eran@hueniverse.com>
In-Reply-To: <C7762120.2D175%eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 22:57:07 -0000

Interestingly enough, when I bought, over the Internet, a ticket to Film 
Forum in New York, the way it worked, it amounted to a number (token), 
which I had to redeem at the movie theater. I was authenticated by 
showing my credit card with which I bought the ticket; I guess I could 
have been asked for a drivers license, too. So even in the movie ticket 
case, there was a (sort of) strong authentication of the token bearer at 
the point of obtaining the resource. Interestingly enough, the same 
method is being used with the airline tickets, where the risks are much 
higher.

This is why I am taking the same position as Eran.

Igor

Eran Hammer-Lahav wrote:
>
> On 1/15/10 7:58 AM, "John Kemp" <john@jkemp.net> wrote:
>
>   
>> When I look at what is possible in the offline world, I would ask - would you
>> require that movie theatre tickets bought in advance were encrypted in
>> transport between the person who bought the ticket and the receptionist at the
>> cinema? What if the person drops her ticket and it's picked up by someone
>> else? The risk of someone dropping his ticket is low, so we don't bother to
>> secure it (of course, I haven't been to a city movie theatre in years so
>> perhaps you need to show ID even to see a movie these days -- I hope not ;) Of
>> course, the person who _does_ drop his ticket will be mad when he gets to the
>> movie theatre, but probably not too mad. The system has worked quite well
>> without any real security. We might add more security, but it would, even
>> today, probably be hard to justify the cost.
>>     
>
> I don't think this is a fair comparison. Stealing a movie ticket is very
> hard, and punishable but fines and prison time (potentially federal is
> captured in transit via US Mail). On the other hand, capturing bearer tokens
> while sitting at a Starbucks using nothing more than a laptop with a WiFi
> card is trivial.
>  
>   
>> Yes, those things change over time, but having a sliding scale of security is
>> a good thing, not a bad thing - and that is already allowed by OAuth today,
>> (TLS/SSL+PLAINTEXT, RSA-SHA1, HMAC-SHA1, PLAINTEXT) and will continue even if
>> you remove PLAINTEXT from the list.
>>     
>
> We are creating web standards, not just generic technologies. I don't want
> to find *any* PLAINTEXT implementation on the web, but don't care if someone
> uses it on their own private network. But if that's what they are doing,
> they are free to drop TLS/SSL requirement anyway because they control the
> environment.
>
> Since we are talking about one word, MUST vs. SHOULD, I think we should
> start with MUST and continue having this discussion when we have more pieces
> of the puzzle in place.
>
> EHL
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>   


From john@jkemp.net  Fri Jan 15 15:01:23 2010
Return-Path: <john@jkemp.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F11893A67FF for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 15:01:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.207
X-Spam-Level: 
X-Spam-Status: No, score=-2.207 tagged_above=-999 required=5 tests=[AWL=0.058,  BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AxelVd1hUUNA for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 15:01:22 -0800 (PST)
Received: from outbound-mail-158.bluehost.com (outbound-mail-158.bluehost.com [67.222.39.38]) by core3.amsl.com (Postfix) with SMTP id 01EF73A67E6 for <oauth@ietf.org>; Fri, 15 Jan 2010 15:01:21 -0800 (PST)
Received: (qmail 14446 invoked by uid 0); 15 Jan 2010 23:01:19 -0000
Received: from unknown (HELO box320.bluehost.com) (69.89.31.120) by outboundproxy5.bluehost.com with SMTP; 15 Jan 2010 23:01:19 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=jkemp.net; h=Received:Subject:Mime-Version:Content-Type:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-Identified-User; b=gTy5Pnm86D9/zFyEp5I7blbfL+cMQ0UTAjeAYdJLyZIQyKpsHEpVcu8IfQ7V60oUQSfIxtzmyJ8PKF47G8pJjVFRtfQq+9CNdsVJRX7RpjVjwEwTfI0RCzfT9AkYSbtq;
Received: from cpe-69-205-56-47.nycap.res.rr.com ([69.205.56.47] helo=[192.168.1.103]) by box320.bluehost.com with esmtpa (Exim 4.69) (envelope-from <john@jkemp.net>) id 1NVvAM-0007pa-I7; Fri, 15 Jan 2010 16:01:19 -0700
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: John Kemp <john@jkemp.net>
In-Reply-To: <4B50F2BD.8030104@alcatel-lucent.com>
Date: Fri, 15 Jan 2010 18:01:17 -0500
Content-Transfer-Encoding: quoted-printable
Message-Id: <B274D80E-2857-4D81-A647-99CC00503403@jkemp.net>
References: <C7762120.2D175%eran@hueniverse.com> <4B50F2BD.8030104@alcatel-lucent.com>
To: faynberg@alcatel-lucent.com
X-Mailer: Apple Mail (2.1077)
X-Identified-User: {1122:box320.bluehost.com:jkempnet:jkemp.net} {sentby:smtp auth 69.205.56.47 authed with john+jkemp.net}
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 23:01:23 -0000

On Jan 15, 2010, at 5:57 PM, Igor Faynberg wrote:

> Interestingly enough, when I bought, over the Internet, a ticket to =
Film Forum in New York, the way it worked, it amounted to a number =
(token), which I had to redeem at the movie theater. I was authenticated =
by showing my credit card with which I bought the ticket; I guess I =
could have been asked for a drivers license, too. So even in the movie =
ticket case, there was a (sort of) strong authentication of the token =
bearer at the point of obtaining the resource. Interestingly enough, the =
same method is being used with the airline tickets, where the risks are =
much higher.

Right, you were authenticated as an authorized bearer of the token, by =
matching information about the bearer in the token against additional =
information you provided separately. That's possible without channel =
security, of course.=20

- johnk

>=20
> This is why I am taking the same position as Eran.
>=20
> Igor
>=20
> Eran Hammer-Lahav wrote:
>>=20
>> On 1/15/10 7:58 AM, "John Kemp" <john@jkemp.net> wrote:
>>=20
>> =20
>>> When I look at what is possible in the offline world, I would ask - =
would you
>>> require that movie theatre tickets bought in advance were encrypted =
in
>>> transport between the person who bought the ticket and the =
receptionist at the
>>> cinema? What if the person drops her ticket and it's picked up by =
someone
>>> else? The risk of someone dropping his ticket is low, so we don't =
bother to
>>> secure it (of course, I haven't been to a city movie theatre in =
years so
>>> perhaps you need to show ID even to see a movie these days -- I hope =
not ;) Of
>>> course, the person who _does_ drop his ticket will be mad when he =
gets to the
>>> movie theatre, but probably not too mad. The system has worked quite =
well
>>> without any real security. We might add more security, but it would, =
even
>>> today, probably be hard to justify the cost.
>>>   =20
>>=20
>> I don't think this is a fair comparison. Stealing a movie ticket is =
very
>> hard, and punishable but fines and prison time (potentially federal =
is
>> captured in transit via US Mail). On the other hand, capturing bearer =
tokens
>> while sitting at a Starbucks using nothing more than a laptop with a =
WiFi
>> card is trivial.
>>  =20
>>> Yes, those things change over time, but having a sliding scale of =
security is
>>> a good thing, not a bad thing - and that is already allowed by OAuth =
today,
>>> (TLS/SSL+PLAINTEXT, RSA-SHA1, HMAC-SHA1, PLAINTEXT) and will =
continue even if
>>> you remove PLAINTEXT from the list.
>>>   =20
>>=20
>> We are creating web standards, not just generic technologies. I don't =
want
>> to find *any* PLAINTEXT implementation on the web, but don't care if =
someone
>> uses it on their own private network. But if that's what they are =
doing,
>> they are free to drop TLS/SSL requirement anyway because they control =
the
>> environment.
>>=20
>> Since we are talking about one word, MUST vs. SHOULD, I think we =
should
>> start with MUST and continue having this discussion when we have more =
pieces
>> of the puzzle in place.
>>=20
>> EHL
>>=20
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>> =20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From stpeter@stpeter.im  Fri Jan 15 15:06:24 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id BEA0F3A682A for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 15:06:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.799
X-Spam-Level: 
X-Spam-Status: No, score=-2.799 tagged_above=-999 required=5 tests=[AWL=-0.200, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3-u+uO7Bkvek for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 15:06:23 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id BA69F3A67FF for <oauth@ietf.org>; Fri, 15 Jan 2010 15:06:23 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 4FBEB40D1C for <oauth@ietf.org>; Fri, 15 Jan 2010 16:06:20 -0700 (MST)
Message-ID: <4B50F4EB.3000402@stpeter.im>
Date: Fri, 15 Jan 2010 16:06:19 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000603050804000703030502"
Subject: [OAUTH-WG] draft agenda for first interim meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 23:06:24 -0000

This is a cryptographically signed message in MIME format.

--------------ms000603050804000703030502
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

OAuth WG Interim Meeting Agenda
Date: 2010-01-21
Time: 19:00 UTC (check for your local time)
Length: 60 minutes

Chairs: Blaine Cook and Peter Saint-Andre

LOGISTICS

Web:
https://workgreen.webex.com/workgreen/j.php?ED=3D131214267&UID=3D0&PW=3DN=
MTU2ODQyMWY5&RT=3DMiMyMQ%3D%3D

Password: oauth

Phone (USA/Canada): 1-408-792-6300

Phone (Global):
https://workgreen.webex.com/workgreen/globalcallin.php?serviceType=3DMC&E=
D=3D131214267&tollFree=3D0

Access code: 962 929 885

Help: https://workgreen.webex.com/workgreen/mc
      or ping me via xmpp:stpeter@jabber.org

Chat Room: xmpp:oauth@jabber.ietf.org?join

AGENDA

1. Introduction (5 minutes)

   a. NOTE WELL applies to interim meetings!
      <http://www.ietf.org/about/note-well.html>
   b. Welcome from the chairs
   c. Volunteer to write the minutes
   b. Agenda bashing

2. Goals of the Interim Meetings (5 minutes)

   a. Accurately describe the problem space
   b. Gather scenarios / use cases / profiles
   c. For authentication, reach *rough* consensus
   d. For authorization and delegation, determine roughly which aspects
      are "core" and which are "extensions"
   e. Make significant progress before IETF 77 in Anaheim
   f. Any others?

3. Problem Space (10 minutes)

   a. Need a clearer definition of what we're trying to solve
   b. Has the problem shifted since OAuth 1.0?
   c. What problem are we solving now?
   d. Can we settle on consistent terminology, please? :)
   e. Architecture matters

3. Scenarios (15 minutes)

   a. Core scenarios, see draft-ietf-oauth-web-delegation-01
   b. Scenarios from WRAP, see draft-hardt-oauth-01
   c. Scenarios from User Managed Access (UMA), I-D on the way?
   d. How can we gather other scenarios?

6. Authentication (10 minutes)

   a. draft-ietf-oauth-authentication
   b. Open issues

7. Authorization and Delegation (10 minutes)

   a. What is core?
   b. What can we define as extensions?

8. Action Items (5 minutes)

   a. Gather more scenarios
   b. Review draft-ietf-oauth-authentication and work through
      remaining issues
   c. Input on authorization and delegation
   d. Time of next interim meeting

END




--------------ms000603050804000703030502
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000603050804000703030502--

From faynberg@alcatel-lucent.com  Fri Jan 15 15:24:52 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 93E533A69B3 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 15:24:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.684
X-Spam-Level: 
X-Spam-Status: No, score=-2.684 tagged_above=-999 required=5 tests=[AWL=-0.085, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Crw0Yd+c4X7w for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 15:24:51 -0800 (PST)
Received: from ihemail1.lucent.com (ihemail1.lucent.com [135.245.0.33]) by core3.amsl.com (Postfix) with ESMTP id B68AC3A69AE for <oauth@ietf.org>; Fri, 15 Jan 2010 15:24:51 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail1.lucent.com (8.13.8/IER-o) with ESMTP id o0FNOkkc024981 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 15 Jan 2010 17:24:46 -0600 (CST)
Received: from [135.244.38.97] (faynberg.lra.lucent.com [135.244.38.97]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0FNOjIt013860; Fri, 15 Jan 2010 17:24:45 -0600 (CST)
Message-ID: <4B50F93E.3060601@alcatel-lucent.com>
Date: Fri, 15 Jan 2010 18:24:46 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: John Kemp <john@jkemp.net>
References: <C7762120.2D175%eran@hueniverse.com> <4B50F2BD.8030104@alcatel-lucent.com> <B274D80E-2857-4D81-A647-99CC00503403@jkemp.net>
In-Reply-To: <B274D80E-2857-4D81-A647-99CC00503403@jkemp.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.33
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Allowing Secrets in the Clear Over Insecure Channels
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Jan 2010 23:24:52 -0000

John Kemp wrote:
> On Jan 15, 2010, at 5:57 PM, Igor Faynberg wrote:
>
>   
>
> Right, you were authenticated as an authorized bearer of the token, by matching information about the bearer in the token against additional information you provided separately. That's possible without channel security, of course. 
>
>   
Exactly, and I did not see in OAuth a way to enforce the token bearer 
authentication, which is one reason I was for channel security. The 
other reason is privacy. Even with movie tickets, some people might 
prefer that no one  know what exactly they are buying. The channel 
security sort of takes care of the transaction privacy at the same time 
as doing other useful things. I think this will be a serious point in 
bringing SIP to use OAuth.

Igor

From john.hurliman@intel.com  Fri Jan 15 16:55:08 2010
Return-Path: <john.hurliman@intel.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 920653A6994 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 16:55:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCJ7wOhATAkU for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 16:55:03 -0800 (PST)
Received: from mga14.intel.com (mga14.intel.com [143.182.124.37]) by core3.amsl.com (Postfix) with ESMTP id 763D63A6405 for <oauth@ietf.org>; Fri, 15 Jan 2010 16:55:03 -0800 (PST)
Received: from azsmga001.ch.intel.com ([10.2.17.19]) by azsmga102.ch.intel.com with ESMTP; 15 Jan 2010 16:55:00 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.47,316,1257148800";  d="scan'208,217";a="233340225"
Received: from rrsmsx603.amr.corp.intel.com ([10.31.0.57]) by azsmga001.ch.intel.com with ESMTP; 15 Jan 2010 16:55:00 -0800
Received: from rrsmsx506.amr.corp.intel.com ([10.31.0.39]) by rrsmsx603.amr.corp.intel.com ([10.31.0.57]) with mapi; Fri, 15 Jan 2010 17:55:00 -0700
From: "Hurliman, John" <john.hurliman@intel.com>
To: OAuth WG <oauth@ietf.org>, "oauth-wrap-wg@googlegroups.com" <oauth-wrap-wg@googlegroups.com>
Date: Fri, 15 Jan 2010 17:54:46 -0700
Thread-Topic: Virtual world use case for OAuth
Thread-Index: AcqWRn+4RGLXmBEkRX2Lu93n6uJYZQ==
Message-ID: <62BFE5680C037E4DA0B0A08946C0933DC4A74D2B@rrsmsx506.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_62BFE5680C037E4DA0B0A08946C0933DC4A74D2Brrsmsx506amrcor_"
MIME-Version: 1.0
Subject: [OAUTH-WG] Virtual world use case for OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jan 2010 00:55:08 -0000

--_000_62BFE5680C037E4DA0B0A08946C0933DC4A74D2Brrsmsx506amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hello OAuth lists!

Let my briefly introduce myself. I'm John Hurliman, a software engineer on =
Intel's Virtual World Infrastructure team. Our team focuses on everything i=
n immersive connected experiences from performance and scalability to feder=
ated identity and interoperability. My project over the last year has been =
Cable Beach, a research project to investigate topics such as federated ide=
ntity, delegated service authorization, service discovery, etc. as they app=
ly to immersive connected experiences. I've also been working closely with =
the VWRAP (Virtual World Region Access Protocol) IETF group and plan to mer=
ge my Cable Beach work into VWRAP. I'll be presenting at VWRAP IETF77 and w=
ill hopefully be able to stop by the OAuth working group as well.

I recently wrote a blog post detailing the history of VWRAP and Cable Beach=
, and how OAuth WRAP is currently meeting our needs (and hopefully OAuth 2.=
0). Hopefully this can serve as an example scenario for OAuth. http://www.j=
hurliman.org/2010/01/merging-vwrap-and-cable-beach/

The important highlights are: 1) We need to support both web-initiated logi=
ns and logins directly through a client where the user inputs a username/pa=
ssword. The latter will also support automated clients where it's not feasi=
ble for a human to go through a web login process every time. 2) We need to=
 expose web APIs for the various virtual world services, preferably using t=
he same system that users login to the virtual world with. 3) We need to be=
 able to login to one virtual world using an account that exists on another=
 world (similar to an OpenID or Facebook Connect login). 4) The easier to i=
mplement the better, since we will likely have implementations popping up i=
n at least C++, C#, Python, PHP, and Java.

Best,
John Hurliman
Intel Corp.

--_000_62BFE5680C037E4DA0B0A08946C0933DC4A74D2Brrsmsx506amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal>Hello OAuth lists!<o:p></o:p></p>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal>Let my briefly introduce myself. I&#8217;m John Hurlim=
an, a
software engineer on Intel&#8217;s Virtual World Infrastructure team. Our t=
eam
focuses on everything in immersive connected experiences from performance a=
nd scalability
to federated identity and interoperability. My project over the last year h=
as
been Cable Beach, a research project to investigate topics such as federate=
d
identity, delegated service authorization, service discovery, etc. as they
apply to immersive connected experiences. I&#8217;ve also been working clos=
ely
with the VWRAP (Virtual World Region Access Protocol) IETF group and plan t=
o
merge my Cable Beach work into VWRAP. I&#8217;ll be presenting at VWRAP IET=
F77
and will hopefully be able to stop by the OAuth working group as well.<o:p>=
</o:p></p>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal>I recently wrote a blog post detailing the history of =
VWRAP
and Cable Beach, and how OAuth WRAP is currently meeting our needs (and
hopefully OAuth 2.0). Hopefully this can serve as an example scenario for O=
Auth.
<a href=3D"http://www.jhurliman.org/2010/01/merging-vwrap-and-cable-beach/"=
>http://www.jhurliman.org/2010/01/merging-vwrap-and-cable-beach/</a><o:p></=
o:p></p>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal>The important highlights are: 1) We need to support bo=
th
web-initiated logins and logins directly through a client where the user in=
puts
a username/password. The latter will also support automated clients where i=
t&#8217;s
not feasible for a human to go through a web login process every time. 2) W=
e
need to expose web APIs for the various virtual world services, preferably
using the same system that users login to the virtual world with. 3) We nee=
d to
be able to login to one virtual world using an account that exists on anoth=
er
world (similar to an OpenID or Facebook Connect login). 4) The easier to
implement the better, since we will likely have implementations popping up =
in
at least C++, C#, Python, PHP, and Java.<o:p></o:p></p>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal>Best,<o:p></o:p></p>

<p class=3DMsoNormal>John Hurliman<o:p></o:p></p>

<p class=3DMsoNormal>Intel Corp.<o:p></o:p></p>

</div>

</body>

</html>

--_000_62BFE5680C037E4DA0B0A08946C0933DC4A74D2Brrsmsx506amrcor_--

From recordond@gmail.com  Fri Jan 15 20:06:11 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 817783A6452 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:06:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.134
X-Spam-Level: 
X-Spam-Status: No, score=-2.134 tagged_above=-999 required=5 tests=[AWL=0.465,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d5ARZvg81Hiu for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:06:10 -0800 (PST)
Received: from mail-iw0-f201.google.com (mail-iw0-f201.google.com [209.85.223.201]) by core3.amsl.com (Postfix) with ESMTP id 4ECD53A6804 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:06:10 -0800 (PST)
Received: by iwn39 with SMTP id 39so997375iwn.32 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:06:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=KAoZ6rbjnESduFw/rF/T5dnPGjDUiyliARl51UJqfTE=; b=aJWlIjd/DAsK9/10mpl0+fQL+uiudCuFGlCMt7w+vEHhwtfoUYhwugf/VF1H9REV4C tvPi+9555AdWs9EboWggyvgVnRHepnEaghyEhXW8BSaobqDPCJ02BFWTlXuHHSczYEEq 6DeTu5SM0ZGpuFS/7zX1UXSV2OafwPv8LG8AE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=KNHg/+v6DJA78kie1QeXtq3zJjQMimN/oKNidLeM+RIcLpVXbXs3jt826Xz+FOICIq YrXuZUAIrrCbJ7rmG9HI2EmOsFLYYdF3XRxsm8OVmHmp9ugX5ONTDcM7M8NVOFEDOpsF clNhhxK72F5TfP1pkBtsvT8TOYaxmYgNmhBFQ=
MIME-Version: 1.0
Received: by 10.231.40.216 with SMTP id l24mr3281482ibe.40.1263614764505; Fri,  15 Jan 2010 20:06:04 -0800 (PST)
In-Reply-To: <C773AB13.2D05A%eran@hueniverse.com>
References: <C773AB13.2D05A%eran@hueniverse.com>
Date: Fri, 15 Jan 2010 20:06:04 -0800
Message-ID: <fd6741651001152006of0df0e0rdaf85e56074df781@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Setting Course
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jan 2010 04:06:11 -0000

Yes, those two drafts make sense.  From other threads it sounds like
we're making progress on the Authentication draft which will both
support signatures (ala OAuth 1.x) and plaintext plus SSL/TLS (ala
WRAP).  I'll try to start working toward consensus on the core flows
we'd like to support in the Authorization draft next week.

--David

On Wed, Jan 13, 2010 at 4:53 PM, Eran Hammer-Lahav <eran@hueniverse.com> wrote:
> I think the goal of the next two months is to produce two semi-stable drafts
> covering the two parts of the protocol:
>
> 1. Authentication - how to make authenticated requests / signed messages
> using token credentials. This will be based on my token auth draft [1] as a
> starting point. There are a few open issues to decide based on feedback
> received from Panzer and Eaton which I will post about shortly.
>
> 2. Authorization - how to obtain a set of token credentials using web
> redirection and other flows introduced by WRAP. This will be a new draft
> using the web-delegation draft [2] skeleton and the flows in WRAP section 5
> [3]. There are many open issues to decide, starting with which flows to
> keep, which to move to an extension, and if there are additional ones to
> add.
>
> These drafts will be locked before the WG meeting to allow review and will
> be discussed at the meeting. We will also discuss any charter changes
> required to accommodate the drafts. This approach will allow us to focus on
> the work and worry about the charter at the meeting. This will ensure we
> ground the process in actual technical consensus.
>
> Comments?
>
> EHL
>
> [1] http://tools.ietf.org/html/draft-hammer-http-token-auth
> [2] http://tools.ietf.org/html/draft-ietf-oauth-web-delegation
> [3] http://bit.ly/oauth-wrap
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

From recordond@gmail.com  Fri Jan 15 20:07:34 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C30CA3A6778 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:07:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.289
X-Spam-Level: 
X-Spam-Status: No, score=-2.289 tagged_above=-999 required=5 tests=[AWL=0.310,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z+VV+eiXW+Ra for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:07:33 -0800 (PST)
Received: from mail-iw0-f201.google.com (mail-iw0-f201.google.com [209.85.223.201]) by core3.amsl.com (Postfix) with ESMTP id 55D073A6804 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:07:33 -0800 (PST)
Received: by iwn39 with SMTP id 39so997822iwn.32 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:07:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=aTTgnRMebiYDoc6DaokLHPNUHhTxyHTCwgxPUhH5te8=; b=Cz+hUVhVCYQSv9ZZnCsZrJ8BS8iGsQZkBaY9bGnw7MLnU5cv4mUmsZuunvVx0Eetxp f6c6he6Ic4/8GcWwtogxRGgEWpSdVUmeYNwVq+llhIn8NQoxiPOn3oLImcAep3hy2pz6 P9xNapE/Uaz5Op9iZY8GR2KBDF0PEbvrPMocE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=p0TPQACNaNi6H9JWhZQS6Dd9hJ4vmJwCrrPOo5IT7CXWRFdQY0xlQoHdxJCYnUwsYS LKA5qOC1kL46wDXY5ojV//gWY2CDdc53Tc4Y+CZzzjumlWqdKjIPkX6TcBAOjFtbJugh janIpMylOwFw7tU0LTndXDDVxHryP7DEvV1kk=
MIME-Version: 1.0
Received: by 10.231.170.14 with SMTP id b14mr479666ibz.26.1263614847782; Fri,  15 Jan 2010 20:07:27 -0800 (PST)
In-Reply-To: <4B50EF5D.4020303@stpeter.im>
References: <4B50EF5D.4020303@stpeter.im>
Date: Fri, 15 Jan 2010 20:07:27 -0800
Message-ID: <fd6741651001152007h6e60a34ak15978ba0ca391b53@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Peter Saint-Andre <stpeter@stpeter.im>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: I-D Action:draft-hardt-oauth-01.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jan 2010 04:07:35 -0000

Hey Peter,
Awesome!  Thanks Dick!

How can we have an HTML version of it (i.e.
http://www.ietf.org/id/draft-hardt-oauth-01.html) published as well?
It's much easier to discuss when we can link to specific sections.

Thanks,
--David

On Fri, Jan 15, 2010 at 2:42 PM, Peter Saint-Andre <stpeter@stpeter.im> wro=
te:
> FYI. Thanks to Dick for submitting this!
>
> /psa
>
> -------- Original Message --------
> Subject: I-D Action:draft-hardt-oauth-01.txt
> Date: Fri, 15 Jan 2010 14:15:02 -0800 (PST)
> From: Internet-Drafts@ietf.org
> Reply-To: internet-drafts@ietf.org
> To: i-d-announce@ietf.org
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
> =A0 =A0 =A0 =A0Title =A0 =A0 =A0 =A0 =A0 : OAuth Web Resource Authorizati=
on Profiles
> =A0 =A0 =A0 =A0Author(s) =A0 =A0 =A0 : D. Hardt, et al.
> =A0 =A0 =A0 =A0Filename =A0 =A0 =A0 =A0: draft-hardt-oauth-01.txt
> =A0 =A0 =A0 =A0Pages =A0 =A0 =A0 =A0 =A0 : 40
> =A0 =A0 =A0 =A0Date =A0 =A0 =A0 =A0 =A0 =A0: 2010-01-15
>
> The OAuth Web Resource Authorization Profiles (OAuth WRAP) allow a
> server hosting a Protected Resource to delegate authorization to one
> or more authorities. =A0An application (Client) accesses the Protected
> Resource by presenting a short lived, opaque, bearer token (Access
> Token) obtained from an authority (Authorization Server). =A0There are
> Profiles for how a Client may obtain an Access Token when acting
> autonomously or on behalf of a User.
>
> Status of this Memo
>
> This Internet-Draft is submitted to IETF in full conformance with the
> provisions of BCP 78 and BCP 79.
>
> Internet-Drafts are working documents of the Internet Engineering
> Task Force (IETF), its areas, and its working groups. =A0Note that
> other groups may also distribute working documents as Internet-
> Drafts.
>
> Internet-Drafts are draft documents valid for a maximum of six months
> and may be updated, replaced, or obsoleted by other documents at any
> time. =A0It is inappropriate to use Internet-Drafts as reference
> material or to cite them other than as "work in progress."
>
> The list of current Internet-Drafts can be accessed at
> http://www.ietf.org/ietf/1id-abstracts.txt.
>
> The list of Internet-Draft Shadow Directories can be accessed at
> http://www.ietf.org/shadow.html.
>
> This Internet-Draft will expire on July 19, 2010.
>
> Copyright Notice
> Copyright (c) 2010 IETF Trust and the persons identified as the
> document authors. =A0All rights reserved.
>
> This document is subject to BCP 78 and the IETF Trust's Legal
> Provisions Relating to IETF Documents
> (http://trustee.ietf.org/license-info) in effect on the date of
> publication of this document. =A0Please review these documents
> carefully, as they describe your rights and restrictions with respect
> to this document. =A0Code Components extracted from this document must
> include Simplified BSD License text as described in Section 4.e of
> the Trust Legal Provisions and are provided without warranty as
> described in the BSD License.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-hardt-oauth-01.txt
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

From recordond@gmail.com  Fri Jan 15 20:12:59 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5659D3A6848 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:12:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.367
X-Spam-Level: 
X-Spam-Status: No, score=-2.367 tagged_above=-999 required=5 tests=[AWL=0.233,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Pooj3GGRhnfg for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:12:57 -0800 (PST)
Received: from mail-iw0-f201.google.com (mail-iw0-f201.google.com [209.85.223.201]) by core3.amsl.com (Postfix) with ESMTP id 8D6D13A6778 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:12:55 -0800 (PST)
Received: by iwn39 with SMTP id 39so999533iwn.32 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:12:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type :content-transfer-encoding; bh=UMtfXhQQexWMBP71V+N8st9D7jTTR8Cz8lNw0FF7g7M=; b=XSpXZ+wJemU3Ttp+Z8O4UY3HOv4ZBpW7lEn4nGz1xuJbO1ZRn4/3o+xAFauxO0WxQC YRvzy0KEL1x2M7ddT0t8GmaIwAB7EnDRHRnuLqieHPxcKuu2q9NwQEgNhDOl+CzjTi1p RszKhFanRKutwpBWVpjzS/pDEPAqxqb+ia/yw=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; b=srAmRj+LXKcZK55BsfEilzQZvIC25xr9IbhMoCs7hr7YUibB6s+0QbKWqEPdKRyCBL XidO/R4bjG1aDesEN9JJeO8xWRCUpWa7q3I1fhLzhUb7m4dPU8BEG0ceKHxBMxXX8ONk TeXYJEfJqto7H6tXBXV3kxI/U7CMaNGk/jTKs=
MIME-Version: 1.0
Received: by 10.231.143.148 with SMTP id v20mr1813881ibu.14.1263615169943;  Fri, 15 Jan 2010 20:12:49 -0800 (PST)
In-Reply-To: <62BFE5680C037E4DA0B0A08946C0933DC4A74D2B@rrsmsx506.amr.corp.intel.com>
References: <62BFE5680C037E4DA0B0A08946C0933DC4A74D2B@rrsmsx506.amr.corp.intel.com>
Date: Fri, 15 Jan 2010 20:12:49 -0800
Message-ID: <fd6741651001152012u701a8f5fna169f382d6bbcce8@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: "Hurliman, John" <john.hurliman@intel.com>
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable
Cc: OAuth WG <oauth@ietf.org>, "oauth-wrap-wg@googlegroups.com" <oauth-wrap-wg@googlegroups.com>
Subject: Re: [OAUTH-WG] Virtual world use case for OAuth
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jan 2010 04:12:59 -0000

Hey John,
I think that the OAuth work under way will support your scenarios
other than #3.  Signing in with an arbitrary account is currently best
solved via OpenID.  OAuth powers Twitter's SSO but requires that each
implementor know specifically that it will be a Twitter user logging
in whereas OpenID has bootstrapping discovery built in.

I'm with you for #4; simplicity for developers is really important in
this next generation of OAuth!

--David

On Fri, Jan 15, 2010 at 4:54 PM, Hurliman, John <john.hurliman@intel.com> w=
rote:
> Hello OAuth lists!
>
>
>
> Let my briefly introduce myself. I=92m John Hurliman, a software engineer=
 on
> Intel=92s Virtual World Infrastructure team. Our team focuses on everythi=
ng in
> immersive connected experiences from performance and scalability to
> federated identity and interoperability. My project over the last year ha=
s
> been Cable Beach, a research project to investigate topics such as federa=
ted
> identity, delegated service authorization, service discovery, etc. as the=
y
> apply to immersive connected experiences. I=92ve also been working closel=
y
> with the VWRAP (Virtual World Region Access Protocol) IETF group and plan=
 to
> merge my Cable Beach work into VWRAP. I=92ll be presenting at VWRAP IETF7=
7 and
> will hopefully be able to stop by the OAuth working group as well.
>
>
>
> I recently wrote a blog post detailing the history of VWRAP and Cable Bea=
ch,
> and how OAuth WRAP is currently meeting our needs (and hopefully OAuth 2.=
0).
> Hopefully this can serve as an example scenario for OAuth.
> http://www.jhurliman.org/2010/01/merging-vwrap-and-cable-beach/
>
>
>
> The important highlights are: 1) We need to support both web-initiated
> logins and logins directly through a client where the user inputs a
> username/password. The latter will also support automated clients where i=
t=92s
> not feasible for a human to go through a web login process every time. 2)=
 We
> need to expose web APIs for the various virtual world services, preferabl=
y
> using the same system that users login to the virtual world with. 3) We n=
eed
> to be able to login to one virtual world using an account that exists on
> another world (similar to an OpenID or Facebook Connect login). 4) The
> easier to implement the better, since we will likely have implementations
> popping up in at least C++, C#, Python, PHP, and Java.
>
>
>
> Best,
>
> John Hurliman
>
> Intel Corp.
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

From eran@hueniverse.com  Fri Jan 15 20:13:55 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A5B1E3A6848 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:13:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.512
X-Spam-Level: 
X-Spam-Status: No, score=-2.512 tagged_above=-999 required=5 tests=[AWL=0.086,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cjiQuJkzmxM7 for <oauth@core3.amsl.com>; Fri, 15 Jan 2010 20:13:54 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 2035D3A6778 for <oauth@ietf.org>; Fri, 15 Jan 2010 20:13:54 -0800 (PST)
Received: (qmail 4449 invoked from network); 16 Jan 2010 04:13:50 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 16 Jan 2010 04:13:50 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 15 Jan 2010 21:13:49 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "recordond@gmail.com" <recordond@gmail.com>
Date: Fri, 15 Jan 2010 21:13:47 -0700
Thread-Topic: [OAUTH-WG] Fwd: I-D Action:draft-hardt-oauth-01.txt
Thread-Index: AcqWYW9wgGWv/eBjSBOAZYY5L1ElswAAN0yc
Message-ID: <C7767CFB.2D1C3%eran@hueniverse.com>
In-Reply-To: <fd6741651001152007h6e60a34ak15978ba0ca391b53@mail.gmail.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C7767CFB2D1C3eranhueniversecom_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Fwd: I-D Action:draft-hardt-oauth-01.txt
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 Jan 2010 04:13:55 -0000

--_000_C7767CFB2D1C3eranhueniversecom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

http://tools.ietf.org/html/draft-hardt-oauth is the same text document but =
with HTML navigation. It will give you links for each section.

EHL


On 1/15/10 8:07 PM, "recordond@gmail.com" <recordond@gmail.com> wrote:

Hey Peter,
Awesome!  Thanks Dick!

How can we have an HTML version of it (i.e.
http://www.ietf.org/id/draft-hardt-oauth-01.html) published as well?
It's much easier to discuss when we can link to specific sections.

Thanks,
--David

On Fri, Jan 15, 2010 at 2:42 PM, Peter Saint-Andre <stpeter@stpeter.im> wro=
te:
> FYI. Thanks to Dick for submitting this!
>
> /psa
>
> -------- Original Message --------
> Subject: I-D Action:draft-hardt-oauth-01.txt
> Date: Fri, 15 Jan 2010 14:15:02 -0800 (PST)
> From: Internet-Drafts@ietf.org
> Reply-To: internet-drafts@ietf.org
> To: i-d-announce@ietf.org
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>
>        Title           : OAuth Web Resource Authorization Profiles
>        Author(s)       : D. Hardt, et al.
>        Filename        : draft-hardt-oauth-01.txt
>        Pages           : 40
>        Date            : 2010-01-15
>
> The OAuth Web Resource Authorization Profiles (OAuth WRAP) allow a
> server hosting a Protected Resource to delegate authorization to one
> or more authorities.  An application (Client) accesses the Protected
> Resource by presenting a short lived, opaque, bearer token (Access
> Token) obtained from an authority (Authorization Server).  There are
> Profiles for how a Client may obtain an Access Token when acting
> autonomously or on behalf of a User.
>
> Status of this Memo
>
> This Internet-Draft is submitted to IETF in full conformance with the
> provisions of BCP 78 and BCP 79.
>
> Internet-Drafts are working documents of the Internet Engineering
> Task Force (IETF), its areas, and its working groups.  Note that
> other groups may also distribute working documents as Internet-
> Drafts.
>
> Internet-Drafts are draft documents valid for a maximum of six months
> and may be updated, replaced, or obsoleted by other documents at any
> time.  It is inappropriate to use Internet-Drafts as reference
> material or to cite them other than as "work in progress."
>
> The list of current Internet-Drafts can be accessed at
> http://www.ietf.org/ietf/1id-abstracts.txt.
>
> The list of Internet-Draft Shadow Directories can be accessed at
> http://www.ietf.org/shadow.html.
>
> This Internet-Draft will expire on July 19, 2010.
>
> Copyright Notice
> Copyright (c) 2010 IETF Trust and the persons identified as the
> document authors.  All rights reserved.
>
> This document is subject to BCP 78 and the IETF Trust's Legal
> Provisions Relating to IETF Documents
> (http://trustee.ietf.org/license-info) in effect on the date of
> publication of this document.  Please review these documents
> carefully, as they describe your rights and restrictions with respect
> to this document.  Code Components extracted from this document must
> include Simplified BSD License text as described in Section 4.e of
> the Trust Legal Provisions and are provided without warranty as
> described in the BSD License.
>
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-hardt-oauth-01.txt
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth


--_000_C7767CFB2D1C3eranhueniversecom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] Fwd: I-D Action:draft-hardt-oauth-01.txt</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:=
11pt'><a href=3D"http://tools.ietf.org/html/draft-hardt-oauth">http://tools=
.ietf.org/html/draft-hardt-oauth</a> is the same text document but with HTM=
L navigation. It will give you links for each section.<BR>
<BR>
EHL<BR>
<BR>
<BR>
On 1/15/10 8:07 PM, &quot;<a href=3D"recordond@gmail.com">recordond@gmail.c=
om</a>&quot; &lt;<a href=3D"recordond@gmail.com">recordond@gmail.com</a>&gt=
; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'>Hey Peter,<BR>
Awesome! &nbsp;Thanks Dick!<BR>
<BR>
How can we have an HTML version of it (i.e.<BR>
<a href=3D"http://www.ietf.org/id/draft-hardt-oauth-01.html">http://www.iet=
f.org/id/draft-hardt-oauth-01.html</a>) published as well?<BR>
It's much easier to discuss when we can link to specific sections.<BR>
<BR>
Thanks,<BR>
--David<BR>
<BR>
On Fri, Jan 15, 2010 at 2:42 PM, Peter Saint-Andre &lt;<a href=3D"stpeter@s=
tpeter.im">stpeter@stpeter.im</a>&gt; wrote:<BR>
&gt; FYI. Thanks to Dick for submitting this!<BR>
&gt;<BR>
&gt; /psa<BR>
&gt;<BR>
&gt; -------- Original Message --------<BR>
&gt; Subject: I-D Action:draft-hardt-oauth-01.txt<BR>
&gt; Date: Fri, 15 Jan 2010 14:15:02 -0800 (PST)<BR>
&gt; From: <a href=3D"Internet-Drafts@ietf.org">Internet-Drafts@ietf.org</a=
><BR>
&gt; Reply-To: <a href=3D"internet-drafts@ietf.org">internet-drafts@ietf.or=
g</a><BR>
&gt; To: <a href=3D"i-d-announce@ietf.org">i-d-announce@ietf.org</a><BR>
&gt;<BR>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts<BR>
&gt; directories.<BR>
&gt;<BR>
&gt; =A0 =A0 =A0 =A0Title =A0 =A0 =A0 =A0 =A0 : OAuth Web Resource Authoriz=
ation Profiles<BR>
&gt; =A0 =A0 =A0 =A0Author(s) =A0 =A0 =A0 : D. Hardt, et al.<BR>
&gt; =A0 =A0 =A0 =A0Filename =A0 =A0 =A0 =A0: draft-hardt-oauth-01.txt<BR>
&gt; =A0 =A0 =A0 =A0Pages =A0 =A0 =A0 =A0 =A0 : 40<BR>
&gt; =A0 =A0 =A0 =A0Date =A0 =A0 =A0 =A0 =A0 =A0: 2010-01-15<BR>
&gt;<BR>
&gt; The OAuth Web Resource Authorization Profiles (OAuth WRAP) allow a<BR>
&gt; server hosting a Protected Resource to delegate authorization to one<B=
R>
&gt; or more authorities. =A0An application (Client) accesses the Protected=
<BR>
&gt; Resource by presenting a short lived, opaque, bearer token (Access<BR>
&gt; Token) obtained from an authority (Authorization Server). =A0There are=
<BR>
&gt; Profiles for how a Client may obtain an Access Token when acting<BR>
&gt; autonomously or on behalf of a User.<BR>
&gt;<BR>
&gt; Status of this Memo<BR>
&gt;<BR>
&gt; This Internet-Draft is submitted to IETF in full conformance with the<=
BR>
&gt; provisions of BCP 78 and BCP 79.<BR>
&gt;<BR>
&gt; Internet-Drafts are working documents of the Internet Engineering<BR>
&gt; Task Force (IETF), its areas, and its working groups. =A0Note that<BR>
&gt; other groups may also distribute working documents as Internet-<BR>
&gt; Drafts.<BR>
&gt;<BR>
&gt; Internet-Drafts are draft documents valid for a maximum of six months<=
BR>
&gt; and may be updated, replaced, or obsoleted by other documents at any<B=
R>
&gt; time. =A0It is inappropriate to use Internet-Drafts as reference<BR>
&gt; material or to cite them other than as &quot;work in progress.&quot;<B=
R>
&gt;<BR>
&gt; The list of current Internet-Drafts can be accessed at<BR>
&gt; <a href=3D"http://www.ietf.org/ietf/1id-abstracts.txt">http://www.ietf=
.org/ietf/1id-abstracts.txt</a>.<BR>
&gt;<BR>
&gt; The list of Internet-Draft Shadow Directories can be accessed at<BR>
&gt; <a href=3D"http://www.ietf.org/shadow.html">http://www.ietf.org/shadow=
.html</a>.<BR>
&gt;<BR>
&gt; This Internet-Draft will expire on July 19, 2010.<BR>
&gt;<BR>
&gt; Copyright Notice<BR>
&gt; Copyright (c) 2010 IETF Trust and the persons identified as the<BR>
&gt; document authors. =A0All rights reserved.<BR>
&gt;<BR>
&gt; This document is subject to BCP 78 and the IETF Trust's Legal<BR>
&gt; Provisions Relating to IETF Documents<BR>
&gt; (<a href=3D"http://trustee.ietf.org/license-info">http://trustee.ietf.=
org/license-info</a>) in effect on the date of<BR>
&gt; publication of this document. =A0Please review these documents<BR>
&gt; carefully, as they describe your rights and restrictions with respect<=
BR>
&gt; to this document. =A0Code Components extracted from this document must=
<BR>
&gt; include Simplified BSD License text as described in Section 4.e of<BR>
&gt; the Trust Legal Provisions and are provided without warranty as<BR>
&gt; described in the BSD License.<BR>
&gt;<BR>
&gt; A URL for this Internet-Draft is:<BR>
&gt; <a href=3D"http://www.ietf.org/internet-drafts/draft-hardt-oauth-01.tx=
t">http://www.ietf.org/internet-drafts/draft-hardt-oauth-01.txt</a><BR>
&gt;<BR>
&gt;<BR>
&gt;<BR>
&gt; _______________________________________________<BR>
&gt; OAuth mailing list<BR>
&gt; <a href=3D"OAuth@ietf.org">OAuth@ietf.org</a><BR>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><BR>
&gt;<BR>
&gt;<BR>
_______________________________________________<BR>
OAuth mailing list<BR>
<a href=3D"OAuth@ietf.org">OAuth@ietf.org</a><BR>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C7767CFB2D1C3eranhueniversecom_--

From eran@hueniverse.com  Wed Jan 20 10:18:10 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7C9003A67A6 for <oauth@core3.amsl.com>; Wed, 20 Jan 2010 10:18:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.518
X-Spam-Level: 
X-Spam-Status: No, score=-2.518 tagged_above=-999 required=5 tests=[AWL=0.080,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xUs7PSFqvIsV for <oauth@core3.amsl.com>; Wed, 20 Jan 2010 10:18:09 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 3F0193A63EB for <oauth@ietf.org>; Wed, 20 Jan 2010 10:18:09 -0800 (PST)
Received: (qmail 23119 invoked from network); 20 Jan 2010 18:18:05 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 20 Jan 2010 18:18:05 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 20 Jan 2010 11:18:00 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: HTTP Group <ietf-http-wg@w3.org>
Date: Wed, 20 Jan 2010 11:17:58 -0700
Thread-Topic: Authentication-Info Header
Thread-Index: Acp1BeZ50vQJGcQeSVy/GYWbP92miwk9v4l6
Message-ID: <C77C88D6.2D6C8%eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E7234378529362B@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C77C88D62D6C8eranhueniversecom_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authentication-Info Header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Jan 2010 18:18:10 -0000

--_000_C77C88D62D6C8eranhueniversecom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


Any comments? Suggestions?

EHL

On 12/4/09 9:19 AM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote:

The Authentication-Info header should be added to draft-ietf-httpbis-p7-aut=
h to provide a complete list of all the defined authentication headers. It =
should generalize the definition to make it useful for new authentication s=
chemes:

   The Authentication-Info header is used by the server to communicate
   some information regarding the successful authentication in the response=
.
   The Authentication-Info header is allowed in the trailer of an HTTP
   message transferred via chunked transfer-coding.

     Authentication-Info =3D "Authentication-Info" ":" OWS Authentication-I=
nfo-v
     Authentication-Info-v =3D 1#auth-param

And should probably (finally) define Proxy-Authentication-Info which is onl=
y mentioned in passing in 2617.

It is also not clear if the Authentication-Info header can (or is appropria=
te) together with a new WWW-Authenticate challenge.

---

Also, for OAuth, we are looking for a place to provide authentication error=
 information. The current definition of Authentication-Info limits it use t=
o successful authentications. While I can certainly argue that an error is =
"some information regarding the successful authentication", (i.e. that it w=
as not), it seems to violate the spirit of the text.

I am not aware of other authentication schemes using this header than Diges=
t, and since Digest limits the allowed values, extending this header field =
to mean *any* status information (not just successful) should not break or =
change any existing implementation.

If the definition remains the same, we will need to decide between minting =
a new header Authentication-Error (and corresponding Proxy-Authentication-E=
rror), or find a way to stick the error information together with a new cha=
llenge or as masked as new challenge. I am not excited about the latter opt=
ion, especially given the possibility of multiple challenges in a single he=
ader.

EHL




--_000_C77C88D62D6C8eranhueniversecom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: Authentication-Info Header</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:=
11pt'><BR>
Any comments? Suggestions?<BR>
<BR>
EHL<BR>
<BR>
On 12/4/09 9:19 AM, &quot;Eran Hammer-Lahav&quot; &lt;<a href=3D"eran@hueni=
verse.com">eran@hueniverse.com</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'>The Authentication-Info header should be ad=
ded to draft-ietf-httpbis-p7-auth to provide a complete list of all the def=
ined authentication headers. It should generalize the definition to make it=
 useful for new authentication schemes:<BR>
<BR>
&nbsp;&nbsp;&nbsp;The Authentication-Info header is used by the server to c=
ommunicate<BR>
&nbsp;&nbsp;&nbsp;some information regarding the successful authentication =
in the response.<BR>
&nbsp;&nbsp;&nbsp;The Authentication-Info header is allowed in the trailer =
of an HTTP<BR>
&nbsp;&nbsp;&nbsp;message transferred via chunked transfer-coding.<BR>
<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Authentication-Info =3D &quot;Authentication-=
Info&quot; &quot;:&quot; OWS Authentication-Info-v<BR>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Authentication-Info-v =3D 1#auth-param<BR>
<BR>
And should probably (finally) define Proxy-Authentication-Info which is onl=
y mentioned in passing in 2617.<BR>
<BR>
It is also not clear if the Authentication-Info header can (or is appropria=
te) together with a new WWW-Authenticate challenge.<BR>
<BR>
---<BR>
<BR>
Also, for OAuth, we are looking for a place to provide authentication error=
 information. The current definition of Authentication-Info limits it use t=
o successful authentications. While I can certainly argue that an error is =
&quot;some information regarding the successful authentication&quot;, (i.e.=
 that it was not), it seems to violate the spirit of the text.<BR>
<BR>
I am not aware of other authentication schemes using this header than Diges=
t, and since Digest limits the allowed values, extending this header field =
to mean *any* status information (not just successful) should not break or =
change any existing implementation.<BR>
<BR>
If the definition remains the same, we will need to decide between minting =
a new header Authentication-Error (and corresponding Proxy-Authentication-E=
rror), or find a way to stick the error information together with a new cha=
llenge or as masked as new challenge. I am not excited about the latter opt=
ion, especially given the possibility of multiple challenges in a single he=
ader.<BR>
<BR>
EHL<BR>
<BR>
<BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C77C88D62D6C8eranhueniversecom_--

From Jeff.Hodges@KingsMountain.com  Wed Jan 20 13:18:12 2010
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0429928C0F7 for <oauth@core3.amsl.com>; Wed, 20 Jan 2010 13:18:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.857
X-Spam-Level: 
X-Spam-Status: No, score=-2.857 tagged_above=-999 required=5 tests=[AWL=-0.592, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y2d2iNzcBE6v for <oauth@core3.amsl.com>; Wed, 20 Jan 2010 13:18:11 -0800 (PST)
Received: from outbound-mail-01.bluehost.com (outbound-mail-01.bluehost.com [69.89.21.11]) by core3.amsl.com (Postfix) with SMTP id ED8A328C0D8 for <oauth@ietf.org>; Wed, 20 Jan 2010 13:18:10 -0800 (PST)
Received: (qmail 13065 invoked by uid 0); 20 Jan 2010 21:18:06 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by outboundproxy4.bluehost.com with SMTP; 20 Jan 2010 21:18:06 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kingsmountain.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:Content-Type:Content-Transfer-Encoding:X-Identified-User; b=oPaeVM4F23GFWQvqEHQGVaGgCbGNEJ+dq61agKNDn9XjWUV27VbqAG0aGEisHWvTVwS32M303+/u+/4mtAcF4EBoYYtv3GtrPqAn2gVGUMUKgkfzJFl0lrO3bZH8CEKO;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.48.58]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1NXhwD-0006oG-UU for oauth@ietf.org; Wed, 20 Jan 2010 14:18:06 -0700
Message-ID: <4B57731F.40406@KingsMountain.com>
Date: Wed, 20 Jan 2010 13:18:23 -0800
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Thunderbird 1.5.0.14ubu (X11/20080306)
MIME-Version: 1.0
To: IETF OAuth WG <oauth@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: [OAUTH-WG] fyi:  RFC formatted versions of OAuth WRAP
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Jan 2010 21:18:12 -0000

Seems that a link to this thread (on the oauth-wrap-wg@ list)..

RFC formatted versions of OAuth WRAP
http://groups.google.com/group/oauth-wrap-wg/browse_thread/thread/700d5cf825541218#

..is appropriate to post to this list.

I guess the filename for the oauth wrap i-d changed (to draft-hardt-oauth-01) 
between the time Dick sent the above msg to the oauth-wrap-wg@ list and the 
time he submitted the i-d. (I didn't think the I-D submission tool would allow 
an initial -01 rev, but whatever).

I presume draft-hardt-oauth-01 will be discussed here on oauth@ietf.org, at 
least in terms of it as input to the IETF OAuth WG context.

HTH,

=JeffH



From alexey.melnikov@isode.com  Wed Jan 20 13:34:29 2010
Return-Path: <alexey.melnikov@isode.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 194AF28C0F5 for <oauth@core3.amsl.com>; Wed, 20 Jan 2010 13:34:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.328
X-Spam-Level: 
X-Spam-Status: No, score=-2.328 tagged_above=-999 required=5 tests=[AWL=0.271,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H78VJTkWKN2c for <oauth@core3.amsl.com>; Wed, 20 Jan 2010 13:34:28 -0800 (PST)
Received: from rufus.isode.com (rufus.isode.com [62.3.217.251]) by core3.amsl.com (Postfix) with ESMTP id F293A28C0D8 for <oauth@ietf.org>; Wed, 20 Jan 2010 13:34:27 -0800 (PST)
Received: from [172.16.2.137] (shiny.isode.com [62.3.217.250])  by rufus.isode.com (submission channel) via TCP with ESMTPA  id <S1d23QBYjz3v@rufus.isode.com>; Wed, 20 Jan 2010 21:34:22 +0000
Message-ID: <4B5776A9.3070301@isode.com>
Date: Wed, 20 Jan 2010 21:33:29 +0000
From: Alexey Melnikov <alexey.melnikov@isode.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.12) Gecko/20050915
X-Accept-Language: en-us, en
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <C77C88D6.2D6C8%eran@hueniverse.com>
In-Reply-To: <C77C88D6.2D6C8%eran@hueniverse.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: HTTP Group <ietf-http-wg@w3.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authentication-Info Header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Jan 2010 21:34:29 -0000

Eran Hammer-Lahav wrote:

> Any comments? Suggestions?

Hi Eran,
Speaking as an individual contributor:

> EHL
>
> On 12/4/09 9:19 AM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote:
>
>     The Authentication-Info header should be added to
>     draft-ietf-httpbis-p7-auth to provide a complete list of all the
>     defined authentication headers.
>
Yes.

>     It should generalize the definition to make it useful for new
>     authentication schemes:
>
>        The Authentication-Info header is used by the server to communicate
>        some information regarding the successful authentication in the
>     response.
>        The Authentication-Info header is allowed in the trailer of an HTTP
>        message transferred via chunked transfer-coding.
>
As long as this is consistent with existing usage (I don't remember of 
the top of my head how Negotiate works and whether it is using this 
header field).

>          Authentication-Info = "Authentication-Info" ":" OWS
>     Authentication-Info-v
>          Authentication-Info-v = 1#auth-param
>
>     And should probably (finally) define Proxy-Authentication-Info
>     which is only mentioned in passing in 2617.
>
Yes.

>     It is also not clear if the Authentication-Info header can (or is
>     appropriate) together with a new WWW-Authenticate challenge.
>
Sure. I am not sure I can provide an opinion on this, as I am not an 
implementor.

>     ---
>
>     Also, for OAuth, we are looking for a place to provide
>     authentication error information. The current definition of
>     Authentication-Info limits it use to successful authentications.
>     While I can certainly argue that an error is "some information
>     regarding the successful authentication", (i.e. that it was not),
>     it seems to violate the spirit of the text.
>
>     I am not aware of other authentication schemes using this header
>     than Digest, and since Digest limits the allowed values, extending
>     this header field to mean *any* status information (not just
>     successful) should not break or change any existing implementation.
>
>     If the definition remains the same, we will need to decide between
>     minting a new header Authentication-Error (and corresponding
>     Proxy-Authentication-Error), or find a way to stick the error
>     information together with a new challenge or as masked as new
>     challenge. I am not excited about the latter option, especially
>     given the possibility of multiple challenges in a single header.
>
>     EHL
>

From julian.reschke@gmx.de  Thu Jan 21 01:23:03 2010
Return-Path: <julian.reschke@gmx.de>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 68BDF3A68E7 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 01:23:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.611
X-Spam-Level: 
X-Spam-Status: No, score=-3.611 tagged_above=-999 required=5 tests=[AWL=-1.012, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Fsv3Gkuzdzki for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 01:23:02 -0800 (PST)
Received: from mail.gmx.net (mail.gmx.net [213.165.64.20]) by core3.amsl.com (Postfix) with SMTP id 1ABE33A635F for <oauth@ietf.org>; Thu, 21 Jan 2010 01:23:01 -0800 (PST)
Received: (qmail invoked by alias); 21 Jan 2010 09:22:56 -0000
Received: from p508FFD37.dip.t-dialin.net (EHLO [192.168.178.33]) [80.143.253.55] by mail.gmx.net (mp067) with SMTP; 21 Jan 2010 10:22:56 +0100
X-Authenticated: #1915285
X-Provags-ID: V01U2FsdGVkX1/AIlFvj93AwnUVgR46MNUqPDHzEmk/1mQ3pv7xCa rB9LcnuAtwyXw6
Message-ID: <4B581CEC.4030609@gmx.de>
Date: Thu, 21 Jan 2010 10:22:52 +0100
From: Julian Reschke <julian.reschke@gmx.de>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.8.0.4) Gecko/20060516 Thunderbird/1.5.0.4 Mnenhy/0.7.4.666
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <C77C88D6.2D6C8%eran@hueniverse.com>
In-Reply-To: <C77C88D6.2D6C8%eran@hueniverse.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
X-FuHaFi: 0.63
Cc: HTTP Group <ietf-http-wg@w3.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authentication-Info Header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 09:23:03 -0000

Eran Hammer-Lahav wrote:
> 
> Any comments? Suggestions?

Sorry for the delay. It was on my TODO list, but that list got too long.

> EHL
> 
> On 12/4/09 9:19 AM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote:
> 
>     The Authentication-Info header should be added to
>     draft-ietf-httpbis-p7-auth to provide a complete list of all the
>     defined authentication headers. It should generalize the definition
>     to make it useful for new authentication schemes:
> ...

As far as I can tell, Authentication-Info in RFC 2617 specific for 
Digest. If that's correct, it doesn't belong into HTTPbis P7.

It may be a good idea to generalize it (I have no opinion on that), but 
it would still need to be specified in a spec other than HTTPbis.

Best regards, Julian

From y.oiwa@aist.go.jp  Thu Jan 21 03:42:17 2010
Return-Path: <y.oiwa@aist.go.jp>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2CE7C3A6984 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 03:42:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.09
X-Spam-Level: 
X-Spam-Status: No, score=-0.09 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9pb3bk5vDld9 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 03:42:16 -0800 (PST)
Received: from faust.rcis.jp (faust.rcis.jp [61.194.89.210]) by core3.amsl.com (Postfix) with ESMTP id 114E83A6A19 for <oauth@ietf.org>; Thu, 21 Jan 2010 03:42:15 -0800 (PST)
Received: from [192.168.1.198] (217.Red-81-34-139.dynamicIP.rima-tde.net [81.34.139.217]) (authenticated bits=0) by faust.rcis.jp (8.13.8/8.13.8/Debian-3) with ESMTP id o0LBfnsc016478;  Thu, 21 Jan 2010 20:41:52 +0900
Message-ID: <4B583D79.4050500@aist.go.jp>
Date: Thu, 21 Jan 2010 20:41:45 +0900
From: Yutaka Oiwa <y.oiwa@aist.go.jp>
Organization: RCIS, AIST
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <C77C88D6.2D6C8%eran@hueniverse.com>
In-Reply-To: <C77C88D6.2D6C8%eran@hueniverse.com>
X-Enigmail-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: HTTP Group <ietf-http-wg@w3.org>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Authentication-Info Header
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 11:42:17 -0000

On 2010/01/21 3:17, Eran Hammer-Lahav wrote:
>     I am not aware of other authentication schemes using this header
>     than Digest, and since Digest limits the allowed values, extending
>     this header field to mean *any* status information (not just
>     successful) should not break or change any existing implementation.

We use the Authentication-Info: header in our proposed authentication
scheme (Mutual), and it will be good to have a common syntax for several
authentication schemes.
# We realized, during our implementation, that some implementations prefer to
# have a common syntax for each HTTP header, even when its meaning
# depends on some other values in headers (e.g. on authentication
# schemes).  These use generic lexer-parser to parse such headers first into
# key-value pairs before interpretation.

As Julian says that it is out of current HTTPbis spec,
if you are going to generalize it somewhere (e.g. OAuth WG),
I will join the discussion there.

>     Also, for OAuth, we are looking for a place to provide
>     authentication error information. The current definition of
>     Authentication-Info limits it use to successful authentications.
>     While I can certainly argue that an error is "some information
>     regarding the successful authentication", (i.e. that it was not), it
>     seems to violate the spirit of the text.
>
>     If the definition remains the same, we will need to decide between
>     minting a new header Authentication-Error (and corresponding
>     Proxy-Authentication-Error), or find a way to stick the error
>     information together with a new challenge or as masked as new
>     challenge. I am not excited about the latter option, especially
>     given the possibility of multiple challenges in a single header.

Sorry for my laziness, but could you please give me a little-bit
detail (or a pointer to that) what will be the possible payload on that
[may be in oauth WG ML]?
In our proposal, a field in WWW-Authenticate was sufficient for carrying an
error information (ours has a 1-bit flag in WWW-Authenticate to distinguish
between password mismatch and key expiration, on which client behavior differs).
I'm interested if we also have a similar need which is not realized now.

-- 
Yutaka OIWA, Ph.D.                                       Research Scientist
                            Research Center for Information Security (RCIS)
    National Institute of Advanced Industrial Science and Technology (AIST)
                      Mail addresses: <y.oiwa@aist.go.jp>, <yutaka@oiwa.jp>
OpenPGP: id[440546B5] fp[7C9F 723A 7559 3246 229D  3139 8677 9BD2 4405 46B5]

From stpeter@stpeter.im  Thu Jan 21 09:05:11 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 016913A6A6D for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 09:05:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.781
X-Spam-Level: 
X-Spam-Status: No, score=-2.781 tagged_above=-999 required=5 tests=[AWL=-0.182, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ov6MiALECvkE for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 09:05:10 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id EFF2A3A6A28 for <oauth@ietf.org>; Thu, 21 Jan 2010 09:05:09 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 8770F40C29 for <oauth@ietf.org>; Thu, 21 Jan 2010 10:05:05 -0700 (MST)
Message-ID: <4B588941.50603@stpeter.im>
Date: Thu, 21 Jan 2010 10:05:05 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms090207070102070003080809"
Subject: [OAUTH-WG] interim meeting in ~2 hours
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 17:05:11 -0000

This is a cryptographically signed message in MIME format.

--------------ms090207070102070003080809
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

This is a reminder that our first interim "virtual meeting" will start
in a little under 2 hours. Logistical information is here:

http://www.ietf.org/mail-archive/web/oauth/current/msg00982.html

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms090207070102070003080809
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms090207070102070003080809--

From stpeter@stpeter.im  Thu Jan 21 09:47:44 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9DAAB3A6823 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 09:47:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.766
X-Spam-Level: 
X-Spam-Status: No, score=-2.766 tagged_above=-999 required=5 tests=[AWL=-0.167, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KMvcnxf+vlkE for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 09:47:43 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id B7CF63A6A61 for <oauth@ietf.org>; Thu, 21 Jan 2010 09:47:43 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 8AB5140C29 for <oauth@ietf.org>; Thu, 21 Jan 2010 10:47:39 -0700 (MST)
Message-ID: <4B58933B.5000103@stpeter.im>
Date: Thu, 21 Jan 2010 10:47:39 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: oauth@ietf.org
References: <4B588941.50603@stpeter.im>
In-Reply-To: <4B588941.50603@stpeter.im>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms020200070406050301080908"
Subject: Re: [OAUTH-WG] interim meeting in ~2 hours
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 17:47:44 -0000

This is a cryptographically signed message in MIME format.

--------------ms020200070406050301080908
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Oh, and the proposed agenda is here:

http://www.ietf.org/mail-archive/web/oauth/current/msg01013.html

On 1/21/10 10:05 AM, Peter Saint-Andre wrote:
> This is a reminder that our first interim "virtual meeting" will start
> in a little under 2 hours. Logistical information is here:
>=20
> http://www.ietf.org/mail-archive/web/oauth/current/msg00982.html
>=20
> Peter
>=20
>=20


--------------ms020200070406050301080908
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms020200070406050301080908--

From dick.hardt@gmail.com  Thu Jan 21 10:24:47 2010
Return-Path: <dick.hardt@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6EAD43A6ACF for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 10:24:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id u8T5MR3eKXmH for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 10:24:46 -0800 (PST)
Received: from mail-px0-f186.google.com (mail-px0-f186.google.com [209.85.216.186]) by core3.amsl.com (Postfix) with ESMTP id 56DEE3A6AD8 for <oauth@ietf.org>; Thu, 21 Jan 2010 10:24:46 -0800 (PST)
Received: by pxi16 with SMTP id 16so176854pxi.29 for <oauth@ietf.org>; Thu, 21 Jan 2010 10:24:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:mime-version :content-type:from:in-reply-to:date:cc:content-transfer-encoding :message-id:references:to:x-mailer; bh=9Rgwwj3trmCaMtXgxopCBs8hanzdUXUhLCixwAu37X0=; b=cRDypmqUOTHEzyTQykYeo3XFVH99oZJKW6A3MSYVYRhER3wTJMOCBgyrabmy+xSrOi VaZs9yq8vWeqSvrzB2gl1SdcUFlED8urWqsUMBri0ovXmMPxm5RO994Og8usbxJOBFfk q1HI538k5YatLKndNb5XsuLF9dLKlfo+niubY=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to:x-mailer; b=YDL6nE8TyOhLFfJIa7NTjmJm9as49EPBJkFBdzRWIHiTynZbEx35jSpX3u3tyEExyN FmMA0SJEG4ziZq+6YUuea4yABZn1THbrd3TySQCR5u8xMWsAeXAyU4MyojcoMOwbxcS3 mQFPI9BIwFpkitXHyLbfdIGRfp0l9M1QC6qqs=
Received: by 10.142.247.21 with SMTP id u21mr1230343wfh.85.1264098279440; Thu, 21 Jan 2010 10:24:39 -0800 (PST)
Received: from ?192.168.1.243? (c-24-17-212-68.hsd1.wa.comcast.net [24.17.212.68]) by mx.google.com with ESMTPS id 21sm1293646pzk.3.2010.01.21.10.24.38 (version=TLSv1/SSLv3 cipher=RC4-MD5); Thu, 21 Jan 2010 10:24:39 -0800 (PST)
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Dick Hardt <dick.hardt@gmail.com>
In-Reply-To: <4B58933B.5000103@stpeter.im>
Date: Thu, 21 Jan 2010 10:24:38 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <65338608-5436-4148-9A8E-CFB52B0AF20A@gmail.com>
References: <4B588941.50603@stpeter.im> <4B58933B.5000103@stpeter.im>
To: Peter Saint-Andre <stpeter@stpeter.im>
X-Mailer: Apple Mail (2.1077)
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] interim meeting in ~2 hours
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 18:24:47 -0000

I find the break down between authentication, authorization and =
delegation referenced in the agenda confusing. I know what each of the =
words mean, but not having been part of the early IETF OAuth =
conversation, I'm confused with the breakdown as described in the =
agenda.

Would it be appropriate to cover this in the agenda today, or is there a =
pointer so I can understand what we mean by these terms in the context =
of this WG?

(sorry for the last minute question, this account was not on the mail =
list)

-- Dick

On 2010-01-21, at 9:47 AM, Peter Saint-Andre wrote:

> Oh, and the proposed agenda is here:
>=20
> http://www.ietf.org/mail-archive/web/oauth/current/msg01013.html
>=20
> On 1/21/10 10:05 AM, Peter Saint-Andre wrote:
>> This is a reminder that our first interim "virtual meeting" will =
start
>> in a little under 2 hours. Logistical information is here:
>>=20
>> http://www.ietf.org/mail-archive/web/oauth/current/msg00982.html
>>=20
>> Peter
>>=20
>>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From stpeter@stpeter.im  Thu Jan 21 13:06:08 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id D251728C1A8 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 13:06:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.753
X-Spam-Level: 
X-Spam-Status: No, score=-2.753 tagged_above=-999 required=5 tests=[AWL=-0.154, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2uvuikOWLqOh for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 13:06:08 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 2CCC23A67AF for <oauth@ietf.org>; Thu, 21 Jan 2010 13:06:07 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id BAC2840C29 for <oauth@ietf.org>; Thu, 21 Jan 2010 14:06:02 -0700 (MST)
Message-ID: <4B58C1B9.3090300@stpeter.im>
Date: Thu, 21 Jan 2010 14:06:01 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms040004030103010202030100"
Subject: [OAUTH-WG] meeting follow-up
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 21:06:08 -0000

This is a cryptographically signed message in MIME format.

--------------ms040004030103010202030100
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<hat type=3D'chair'/>

Blaine and I would like to thank those who attended today's interim
meeting. We shall be sending minutes, action items, and other follow-up
matters in the next few days.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms040004030103010202030100
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIWnDCC
B1cwggY/oAMCAQICAVUwDQYJKoZIhvcNAQEFBQAwgYwxCzAJBgNVBAYTAklMMRYwFAYDVQQK
Ew1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBT
aWduaW5nMTgwNgYDVQQDEy9TdGFydENvbSBDbGFzcyAzIFByaW1hcnkgSW50ZXJtZWRpYXRl
IENsaWVudCBDQTAeFw0wOTA3MDYwMDAwMDFaFw0xMDA3MDYyMzU5NTlaMIHCMQswCQYDVQQG
EwJVUzERMA8GA1UECBMIQ29sb3JhZG8xDzANBgNVBAcTBkRlbnZlcjEiMCAGA1UEChMZWE1Q
UCBTdGFuZGFyZHMgRm91bmRhdGlvbjEsMCoGA1UECxMjU3RhcnRDb20gVHJ1c3RlZCBDZXJ0
aWZpY2F0ZSBNZW1iZXIxGjAYBgNVBAMTEVBldGVyIFNhaW50LUFuZHJlMSEwHwYJKoZIhvcN
AQkBFhJzdHBldGVyQHN0cGV0ZXIuaW0wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQCas7Mrnh02GakN8sft+HJpU4MwBxEgrGDZ2ZzUxDDt2sEhM+9Q74h955MtgMhK3TeBf6Hs
hDh/8Z9G//k2qNA0M2S5rejTqrmW0Jabca/L7BUZ0GhnU2N/2zeciFUmuZ4A2l1T5IMX2ZVP
XnNIaefBtbImJAbDz3T0vxkzTtcqgW3wL83PMDiqiuM+e1k+VPvOW4f5ZSGkPIhYCDpWqNE5
wZvjrLNMc8jZOPs9DrsYuIVwU72Vhy1tkEh+w6YpYHrdEUAe+eKe6TuxqZ60e9z3O36uiV//
Ms274iD6PbA/IGazJgaAdg6tvPehwTYGJAGmv3PsJKkLGjgoh+RrrM1LAgMBAAGjggOKMIID
hjAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUH
AwQwHQYDVR0OBBYEFOyws3XWgIY9FP1POVqjdZP9Lu38MB0GA1UdEQQWMBSBEnN0cGV0ZXJA
c3RwZXRlci5pbTCBqAYDVR0jBIGgMIGdgBR7iZySlyShhEcCy3T8LvSs3DLl86GBgaR/MH0x
CzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQuMSswKQYDVQQLEyJTZWN1cmUg
RGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQDEyBTdGFydENvbSBDZXJ0aWZp
Y2F0aW9uIEF1dGhvcml0eYIBDzCCAUcGA1UdIASCAT4wggE6MIIBNgYLKwYBBAGBtTcBAgAw
ggElMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9wb2xpY3kucGRmMDQG
CCsGAQUFBwIBFihodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9pbnRlcm1lZGlhdGUucGRmMIG8
BggrBgEFBQcCAjCBrzAUFg1TdGFydENvbSBMdGQuMAMCAQEagZZMaW1pdGVkIExpYWJpbGl0
eSwgcmVhZCB0aGUgc2VjdGlvbiAqTGVnYWwgTGltaXRhdGlvbnMqIG9mIHRoZSBTdGFydENv
bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSBQb2xpY3kgYXZhaWxhYmxlIGF0IGh0dHA6Ly93
d3cuc3RhcnRzc2wuY29tL3BvbGljeS5wZGYwYwYDVR0fBFwwWjAroCmgJ4YlaHR0cDovL3d3
dy5zdGFydHNzbC5jb20vY3J0dTMtY3JsLmNybDAroCmgJ4YlaHR0cDovL2NybC5zdGFydHNz
bC5jb20vY3J0dTMtY3JsLmNybDCBjgYIKwYBBQUHAQEEgYEwfzA5BggrBgEFBQcwAYYtaHR0
cDovL29jc3Auc3RhcnRzc2wuY29tL3N1Yi9jbGFzczMvY2xpZW50L2NhMEIGCCsGAQUFBzAC
hjZodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS9jZXJ0cy9zdWIuY2xhc3MzLmNsaWVudC5jYS5j
cnQwIwYDVR0SBBwwGoYYaHR0cDovL3d3dy5zdGFydHNzbC5jb20vMA0GCSqGSIb3DQEBBQUA
A4IBAQBgv4xFXZqDKSOtnPOVbqOh1brj7oxRaVYk7N0MJG7x9Y/wkO3iwRwizVLcC1bA+D/R
gyFilXx6IQWE63Ge2tu+Y4w5QoHYwuUFQuBZuxvZpOa3ykdgPlBQaBM8m+Ien0skwNggaizA
X9Pc/sMLpP3jkO1iSF4agy4r5Ed+4G10mP5X0zO3gQwq9Uj4F9tX+58kU+fM1P8Sh+BYR4r/
kSbKE3tWcMaKblWPGwX0nYD26Je7Qb+uX/J5lCgozBrHXQWq8N98iklASf2pv+32Oi1dEjmM
UgAm/J2+YmxaI02+c+H6QH8+F3RUjCiRg9XqUNjcrNrnTFnm/iMMZADktsXPMIIHVzCCBj+g
AwIBAgIBVTANBgkqhkiG9w0BAQUFADCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0
Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcx
ODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDMgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50
IENBMB4XDTA5MDcwNjAwMDAwMVoXDTEwMDcwNjIzNTk1OVowgcIxCzAJBgNVBAYTAlVTMREw
DwYDVQQIEwhDb2xvcmFkbzEPMA0GA1UEBxMGRGVudmVyMSIwIAYDVQQKExlYTVBQIFN0YW5k
YXJkcyBGb3VuZGF0aW9uMSwwKgYDVQQLEyNTdGFydENvbSBUcnVzdGVkIENlcnRpZmljYXRl
IE1lbWJlcjEaMBgGA1UEAxMRUGV0ZXIgU2FpbnQtQW5kcmUxITAfBgkqhkiG9w0BCQEWEnN0
cGV0ZXJAc3RwZXRlci5pbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJqzsyue
HTYZqQ3yx+34cmlTgzAHESCsYNnZnNTEMO3awSEz71DviH3nky2AyErdN4F/oeyEOH/xn0b/
+Tao0DQzZLmt6NOquZbQlptxr8vsFRnQaGdTY3/bN5yIVSa5ngDaXVPkgxfZlU9ec0hp58G1
siYkBsPPdPS/GTNO1yqBbfAvzc8wOKqK4z57WT5U+85bh/llIaQ8iFgIOlao0TnBm+Oss0xz
yNk4+z0Ouxi4hXBTvZWHLW2QSH7Dpilget0RQB754p7pO7GpnrR73Pc7fq6JX/8yzbviIPo9
sD8gZrMmBoB2Dq2896HBNgYkAaa/c+wkqQsaOCiH5GuszUsCAwEAAaOCA4owggOGMAkGA1Ud
EwQCMAAwCwYDVR0PBAQDAgSwMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDAdBgNV
HQ4EFgQU7LCzddaAhj0U/U85WqN1k/0u7fwwHQYDVR0RBBYwFIESc3RwZXRlckBzdHBldGVy
LmltMIGoBgNVHSMEgaAwgZ2AFHuJnJKXJKGERwLLdPwu9KzcMuXzoYGBpH8wfTELMAkGA1UE
BhMCSUwxFjAUBgNVBAoTDVN0YXJ0Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFs
IENlcnRpZmljYXRlIFNpZ25pbmcxKTAnBgNVBAMTIFN0YXJ0Q29tIENlcnRpZmljYXRpb24g
QXV0aG9yaXR5ggEPMIIBRwYDVR0gBIIBPjCCATowggE2BgsrBgEEAYG1NwECADCCASUwLgYI
KwYBBQUHAgEWImh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL3BvbGljeS5wZGYwNAYIKwYBBQUH
AgEWKGh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL2ludGVybWVkaWF0ZS5wZGYwgbwGCCsGAQUF
BwICMIGvMBQWDVN0YXJ0Q29tIEx0ZC4wAwIBARqBlkxpbWl0ZWQgTGlhYmlsaXR5LCByZWFk
IHRoZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENlcnRp
ZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL3d3dy5zdGFy
dHNzbC5jb20vcG9saWN5LnBkZjBjBgNVHR8EXDBaMCugKaAnhiVodHRwOi8vd3d3LnN0YXJ0
c3NsLmNvbS9jcnR1My1jcmwuY3JsMCugKaAnhiVodHRwOi8vY3JsLnN0YXJ0c3NsLmNvbS9j
cnR1My1jcmwuY3JsMIGOBggrBgEFBQcBAQSBgTB/MDkGCCsGAQUFBzABhi1odHRwOi8vb2Nz
cC5zdGFydHNzbC5jb20vc3ViL2NsYXNzMy9jbGllbnQvY2EwQgYIKwYBBQUHMAKGNmh0dHA6
Ly93d3cuc3RhcnRzc2wuY29tL2NlcnRzL3N1Yi5jbGFzczMuY2xpZW50LmNhLmNydDAjBgNV
HRIEHDAahhhodHRwOi8vd3d3LnN0YXJ0c3NsLmNvbS8wDQYJKoZIhvcNAQEFBQADggEBAGC/
jEVdmoMpI62c85Vuo6HVuuPujFFpViTs3QwkbvH1j/CQ7eLBHCLNUtwLVsD4P9GDIWKVfHoh
BYTrcZ7a275jjDlCgdjC5QVC4Fm7G9mk5rfKR2A+UFBoEzyb4h6fSyTA2CBqLMBf09z+wwuk
/eOQ7WJIXhqDLivkR37gbXSY/lfTM7eBDCr1SPgX21f7nyRT58zU/xKH4FhHiv+RJsoTe1Zw
xopuVY8bBfSdgPbol7tBv65f8nmUKCjMGsddBarw33yKSUBJ/am/7fY6LV0SOYxSACb8nb5i
bFojTb5z4fpAfz4XdFSMKJGD1epQ2Nys2udMWeb+IwxkAOS2xc8wggfiMIIFyqADAgECAgEP
MA0GCSqGSIb3DQEBBQUAMH0xCzAJBgNVBAYTAklMMRYwFAYDVQQKEw1TdGFydENvbSBMdGQu
MSswKQYDVQQLEyJTZWN1cmUgRGlnaXRhbCBDZXJ0aWZpY2F0ZSBTaWduaW5nMSkwJwYDVQQD
EyBTdGFydENvbSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNzEwMjQyMTAzMzJaFw0x
MjEwMjIyMTAzMzJaMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjEr
MCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMv
U3RhcnRDb20gQ2xhc3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0EwggEiMA0G
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC5o0luEj4gypQIp71Xi2TlXyLYrj9WkRy+d9BO
0FHPYnAsC99/jx/ibNRwIfAoFhZd+LDscdRSckvwuFSz0bKg3z+9o7cwlVAC9AwMWe8IM0Lx
c+8etYxsX4WIamG9fjzzi5GAW5ESKzzIN3SxHSplyGCWFwx/pgf1f4y6O9/ym+4f6zaDYP6B
x0r+SaJcr6eSGNm7X3EwX1v7XpRBY+aw019o7k72d0IX910F+XGt0OwNdM61Ff3FiTiexeUZ
bWxCGm6GZl+SQVG9xYVIgHQaLXoQF+g2wzrmKCbVcZhqH+hrlRnD6PfCuEyX/BR6PlAPRDlQ
6f1u3wqik+LF5P15AgMBAAGjggNbMIIDVzAMBgNVHRMEBTADAQH/MAsGA1UdDwQEAwIBpjAd
BgNVHQ4EFgQUe4mckpckoYRHAst0/C70rNwy5fMwgagGA1UdIwSBoDCBnYAUTgvvGqRAW6UX
aYcwyjRoQ9BBrvKhgYGkfzB9MQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRk
LjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzEpMCcGA1UE
AxMgU3RhcnRDb20gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHmCAQEwCQYDVR0SBAIwADA9Bggr
BgEFBQcBAQQxMC8wLQYIKwYBBQUHMAKGIWh0dHA6Ly93d3cuc3RhcnRzc2wuY29tL3Nmc2Nh
LmNydDBgBgNVHR8EWTBXMCygKqAohiZodHRwOi8vY2VydC5zdGFydGNvbS5vcmcvc2ZzY2Et
Y3JsLmNybDAnoCWgI4YhaHR0cDovL2NybC5zdGFydHNzbC5jb20vc2ZzY2EuY3JsMIIBXQYD
VR0gBIIBVDCCAVAwggFMBgsrBgEEAYG1NwEBBDCCATswLwYIKwYBBQUHAgEWI2h0dHA6Ly9j
ZXJ0LnN0YXJ0Y29tLm9yZy9wb2xpY3kucGRmMDUGCCsGAQUFBwIBFilodHRwOi8vY2VydC5z
dGFydGNvbS5vcmcvaW50ZXJtZWRpYXRlLnBkZjCB0AYIKwYBBQUHAgIwgcMwJxYgU3RhcnQg
Q29tbWVyY2lhbCAoU3RhcnRDb20pIEx0ZC4wAwIBARqBl0xpbWl0ZWQgTGlhYmlsaXR5LCBy
ZWFkIHRoZSBzZWN0aW9uICpMZWdhbCBMaW1pdGF0aW9ucyogb2YgdGhlIFN0YXJ0Q29tIENl
cnRpZmljYXRpb24gQXV0aG9yaXR5IFBvbGljeSBhdmFpbGFibGUgYXQgaHR0cDovL2NlcnQu
c3RhcnRjb20ub3JnL3BvbGljeS5wZGYwEQYJYIZIAYb4QgEBBAQDAgAHMFAGCWCGSAGG+EIB
DQRDFkFTdGFydENvbSBDbGFzcyAzIFByaW1hcnkgSW50ZXJtZWRpYXRlIEZyZWUgU1NMIEVt
YWlsIENlcnRpZmljYXRlczANBgkqhkiG9w0BAQUFAAOCAgEAUpcEDdsKFRCxFBxcSm+8oMTT
fpS7fbZkxWHx5fHDjvAgaBQ+oY0tk4xtbD6VxeHYjxI63+hj8jICnqeVXPe34Bu+XzekIn2T
lrnPCQobKdQF2p52QgUvIxSURed0jcBaCBV22DSKaUqDOzD/Tx6VQy78zpblXjRH7OALE/+H
jzJVmspdnBUUtQOLYgPo924xkxR25VDdgtEE5vAXa/g2oCeZhy0ZEO4NbgIayAYCJcJRDz0h
dD2Ahec65Kw6LB3N7VXEjiRR5/WoKwH/QteRzPJbFDc1somrApjm2cyg+5nbm1RHeFIz+GxX
luRrPztvhNcby0PtAjqwY1txi4sW0R6ZJPuZ2DZ1/dzckoFhyZgFyOX3SEkNXVLldjTzneFJ
FnVSzDbc720vq184jR7pYoI9+f5QJ96a0iLxEAG8SJ5auBwXI/w2FmKmwmdMvJ8/17+B4sMC
IRrXrDQl2xzpVXh/Qcmk5nf+w8HFmqATGy1OUAQbXga7AySAUaYhvvFk50u0bO5DiUGwzrJO
3TrwvaC2Ei4EFaBmIVgG7TfU5TaaY9IcJSCQ7AGUYE3RFSRpsLOoA3DsxP42YERgS/Nxw29+
YqZtPoO2QPbNpI7xnHVCfNBabx3oDIf438nFfv8spw5BQqBSbEF1izJA57eE64CzHnt7lB20
OFD11avYopwxggPKMIIDxgIBATCBkjCBjDELMAkGA1UEBhMCSUwxFjAUBgNVBAoTDVN0YXJ0
Q29tIEx0ZC4xKzApBgNVBAsTIlNlY3VyZSBEaWdpdGFsIENlcnRpZmljYXRlIFNpZ25pbmcx
ODA2BgNVBAMTL1N0YXJ0Q29tIENsYXNzIDMgUHJpbWFyeSBJbnRlcm1lZGlhdGUgQ2xpZW50
IENBAgFVMAkGBSsOAwIaBQCgggIMMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZI
hvcNAQkFMQ8XDTEwMDEyMTIxMDYwMVowIwYJKoZIhvcNAQkEMRYEFP2HLshN8HSuyBfIQ8vx
ANGHPZEeMF8GCSqGSIb3DQEJDzFSMFAwCwYJYIZIAWUDBAECMAoGCCqGSIb3DQMHMA4GCCqG
SIb3DQMCAgIAgDANBggqhkiG9w0DAgIBQDAHBgUrDgMCBzANBggqhkiG9w0DAgIBKDCBowYJ
KwYBBAGCNxAEMYGVMIGSMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRDb20gTHRk
LjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UE
AxMvU3RhcnRDb20gQ2xhc3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQgQ0ECAVUw
gaUGCyqGSIb3DQEJEAILMYGVoIGSMIGMMQswCQYDVQQGEwJJTDEWMBQGA1UEChMNU3RhcnRD
b20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4
MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3MgMyBQcmltYXJ5IEludGVybWVkaWF0ZSBDbGllbnQg
Q0ECAVUwDQYJKoZIhvcNAQEBBQAEggEAkUBfjs+CHZzFiInjdfWSQYDk8MFx6F8WLU0cZshk
A3bM4JzLzsCsVHeM6YwyLmjemvHj/izDxrn27ArK3LTv9gxSxMlhRvqL0+i+TF4BOMlGkvf1
JO3Okd9VRQ4UUO20U8b91Rew6Bw5JTIYKKmInrTJWgHinEQzcbFHx+igtgUHbsTXhg6hhtt1
5eLhEPCDEq+32thgFpKCc/QcNzbhAYirfgbIPvHcgavS1+2Ud3NXUKvaa3fXbeG7n0DKTmzm
PINU6PxJ7/k/K1hwg8kvKIAKuIAYS048m/hXGWKZvFrIIkg/TJLnVvtTZj17X7Zn0lNEcwGp
oaveeK1NbZLZxAAAAAAAAA==
--------------ms040004030103010202030100--

From stpeter@stpeter.im  Thu Jan 21 13:13:07 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id AD35A3A68B2; Thu, 21 Jan 2010 13:13:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.742
X-Spam-Level: 
X-Spam-Status: No, score=-2.742 tagged_above=-999 required=5 tests=[AWL=-0.143, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qakBoe3glY8Q; Thu, 21 Jan 2010 13:13:06 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 94CF93A67AF; Thu, 21 Jan 2010 13:13:06 -0800 (PST)
Received: from dhcp-64-101-72-234.cisco.com (dhcp-64-101-72-234.cisco.com [64.101.72.234]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 5E9EB40C29; Thu, 21 Jan 2010 14:13:02 -0700 (MST)
Message-ID: <4B58C35D.9060509@stpeter.im>
Date: Thu, 21 Jan 2010 14:13:01 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms040807000309010102050204"
Cc: IESG Secretary <iesg-secretary@ietf.org>
Subject: [OAUTH-WG] second interim meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jan 2010 21:13:08 -0000

This is a cryptographically signed message in MIME format.

--------------ms040807000309010102050204
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On February 4 at 19:00 UTC, the OAuth WG will hold its second interim
virtual meeting leading up to IETF 77. Please join us to continue the
discussion so that we can make rapid progress before Anaheim.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms040807000309010102050204
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms040807000309010102050204--

From wwwrun@core3.amsl.com  Thu Jan 21 16:22:03 2010
Return-Path: <wwwrun@core3.amsl.com>
X-Original-To: oauth@ietf.org
Delivered-To: oauth@core3.amsl.com
Received: by core3.amsl.com (Postfix, from userid 30) id C490328C116; Thu, 21 Jan 2010 16:22:02 -0800 (PST)
From: IESG Secretary <iesg-secretary@ietf.org>
To: IETF Announcement list <ietf-announce@ietf.org>
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0
Message-Id: <20100122002202.C490328C116@core3.amsl.com>
Date: Thu, 21 Jan 2010 16:22:02 -0800 (PST)
Cc: oauth@ietf.org
Subject: [OAUTH-WG] OAuth WG Virtual Interim Meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2010 00:22:03 -0000

On February 4 at 19:00 UTC, the OAuth WG will hold its second interim
virtual meeting leading up to IETF 77. Please join us to continue the
discussion so that we can make rapid progress before Anaheim.

Call-in details and agenda to follow on the OAuth mailing list 
(http://www.ietf.org/mail-archive/web/oauth/current/maillist.html).

From stpeter@stpeter.im  Thu Jan 21 20:13:02 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 53B553A6876 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 20:13:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ox5HhqVZtD3n for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 20:13:01 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 36EC23A680B for <oauth@ietf.org>; Thu, 21 Jan 2010 20:13:00 -0800 (PST)
Received: from squire.local (dsl-228-193.dynamic-dsl.frii.net [216.17.228.193]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 653DA40C29 for <oauth@ietf.org>; Thu, 21 Jan 2010 21:12:55 -0700 (MST)
Message-ID: <4B5925BE.1000307@stpeter.im>
Date: Thu, 21 Jan 2010 21:12:46 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.5) Gecko/20091204 Thunderbird/3.0
MIME-Version: 1.0
To: oauth@ietf.org
References: <4B58C35D.9060509@stpeter.im>
In-Reply-To: <4B58C35D.9060509@stpeter.im>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms040202070701050807010406"
Subject: Re: [OAUTH-WG] second interim meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2010 04:13:02 -0000

This is a cryptographically signed message in MIME format.

--------------ms040202070701050807010406
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

On 1/21/10 2:13 PM, Peter Saint-Andre wrote:
> On February 4 at 19:00 UTC, the OAuth WG will hold its second interim
> virtual meeting leading up to IETF 77. Please join us to continue the
> discussion so that we can make rapid progress before Anaheim.

By popular demand, here is 19:00 UTC in some popular time zones...

Central European Time (most of western Europe): 20:00 =3D 8 PM

UK: 19:00 =3D 7 PM

Eastern Time (N. America): 14:00 =3D 2 PM

Pacific Time (N. America): 11:00 =3D 11 AM

If this time is a problem for future meetings, please let Blaine and me
know on or off list.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms040202070701050807010406
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms040202070701050807010406--

From eve@xmlgrrl.com  Thu Jan 21 21:42:27 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 54D5F3A6860 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 21:42:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.708
X-Spam-Level: *
X-Spam-Status: No, score=1.708 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jUVg29RBxm3m for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 21:42:26 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id 2AE593A67E5 for <oauth@ietf.org>; Thu, 21 Jan 2010 21:42:26 -0800 (PST)
Received: from [192.168.0.76] (fw.mcanet.com [64.186.163.130] (may be forged)) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o0M5fxZr003934 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Thu, 21 Jan 2010 21:42:21 -0800
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <4B5925BE.1000307@stpeter.im>
Date: Thu, 21 Jan 2010 21:41:58 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <172B8418-2306-4F38-A37C-93931AF9762A@xmlgrrl.com>
References: <4B58C35D.9060509@stpeter.im> <4B5925BE.1000307@stpeter.im>
To: Peter Saint-Andre <stpeter@stpeter.im>
X-Mailer: Apple Mail (2.1077)
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] second interim meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2010 05:42:27 -0000

Here's a timeanddate.com link, in case anyone wants to know the =
equivalent in, say, Santiago or Darwin:

=
http://timeanddate.com/worldclock/fixedtime.html?month=3D2&day=3D4&year=3D=
2010&hour=3D19&min=3D0&sec=3D0&p1=3D0&sort=3D2

	Eve

On 21 Jan 2010, at 8:12 PM, Peter Saint-Andre wrote:

> On 1/21/10 2:13 PM, Peter Saint-Andre wrote:
>> On February 4 at 19:00 UTC, the OAuth WG will hold its second interim
>> virtual meeting leading up to IETF 77. Please join us to continue the
>> discussion so that we can make rapid progress before Anaheim.
>=20
> By popular demand, here is 19:00 UTC in some popular time zones...
>=20
> Central European Time (most of western Europe): 20:00 =3D 8 PM
>=20
> UK: 19:00 =3D 7 PM
>=20
> Eastern Time (N. America): 14:00 =3D 2 PM
>=20
> Pacific Time (N. America): 11:00 =3D 11 AM
>=20
> If this time is a problem for future meetings, please let Blaine and =
me
> know on or off list.
>=20
> Peter
>=20
> --=20
> Peter Saint-Andre
> https://stpeter.im/

Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog


From chasen@ironmoney.com  Thu Jan 21 22:46:22 2010
Return-Path: <chasen@ironmoney.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5F8723A6861 for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 22:46:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.976
X-Spam-Level: 
X-Spam-Status: No, score=-1.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TYefyQ6tY9MP for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 22:46:19 -0800 (PST)
Received: from mail-iw0-f193.google.com (mail-iw0-f193.google.com [209.85.223.193]) by core3.amsl.com (Postfix) with ESMTP id 8A6423A6852 for <oauth@ietf.org>; Thu, 21 Jan 2010 22:46:18 -0800 (PST)
Received: by iwn31 with SMTP id 31so804475iwn.5 for <oauth@ietf.org>; Thu, 21 Jan 2010 22:46:10 -0800 (PST)
MIME-Version: 1.0
Received: by 10.231.157.131 with SMTP id b3mr4002434ibx.19.1264142770560; Thu,  21 Jan 2010 22:46:10 -0800 (PST)
Date: Thu, 21 Jan 2010 22:46:10 -0800
Message-ID: <4c07358b1001212246n19850fe1n84ddf724267991c9@mail.gmail.com>
From: Chasen Le Hara <chasen@ironmoney.com>
To: oauth@ietf.org
Content-Type: multipart/alternative; boundary=005045016740c8dfbe047dbb2cd9
Subject: [OAUTH-WG] Resource permissions
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2010 06:47:39 -0000

--005045016740c8dfbe047dbb2cd9
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,

I am currently implementing an API that uses OAuth. I=E2=80=99m including a=
 basic
resource authorization feature in my API that lets clients ask for
read/write permissions to a number of resources while getting a request
token (something like permissions=3D"read:/accounts/
write:/accounts/transactions/").

I know that this isn=E2=80=99t covered by 1.0a or the latest draft. After s=
earching
for a bit, I found this functionality mentioned in this thread [1] and a
thread about OAuth Core 1.1 [2]. I haven=E2=80=99t seen any mention of this=
 since
then, and I don=E2=80=99t believe this is being tackled by WRAP either.

My question to the floor: is there a draft I=E2=80=99ve missed that include=
s
this? Are there any APIs planned or shipping that have this functionality?
Is this something worth standardizing, or should each service provider do i=
t
their own way?
-Chasen

P.S. My apologies if I posted this to the wrong mailing list; I thought thi=
s
would be a better choice than the Google Groups list.

[1]
https://groups.google.com/group/oauth/browse_thread/thread/e44310037ba355e3=
/91cabf9061004d0a
[2]
https://groups.google.com/group/oauth/browse_thread/thread/b4d71abb0ac81e60=
/878a35a9d355437b

--005045016740c8dfbe047dbb2cd9
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Hi,<div><br></div><div>I am currently implementing an API that uses OAuth. =
I=E2=80=99m including a basic resource authorization feature in my API that=
 lets clients ask for read/write permissions to a number of resources while=
 getting a request token (something like permissions=3D&quot;read:/accounts=
/ write:/accounts/transactions/&quot;).</div>
<div><br></div><div>I know that this isn=E2=80=99t covered by 1.0a or the l=
atest draft. After searching for a bit, I found this functionality mentione=
d in this thread [1] and a thread about OAuth Core 1.1 [2].=C2=A0I haven=E2=
=80=99t seen any mention of this since then, and I don=E2=80=99t believe th=
is is being tackled by WRAP either.<div>
<br></div><div>My question to the floor: is there a draft I=E2=80=99ve miss=
ed that includes this?=C2=A0Are there any APIs planned or shipping that hav=
e this functionality? Is this something worth standardizing, or should each=
 service provider do it their own way?</div>
<div>-Chasen</div><div><br></div><div>P.S. My apologies if I posted this to=
 the wrong mailing list; I thought this would be a better choice than the G=
oogle Groups list.</div><div><br></div><div>[1]=C2=A0<a href=3D"https://gro=
ups.google.com/group/oauth/browse_thread/thread/e44310037ba355e3/91cabf9061=
004d0a">https://groups.google.com/group/oauth/browse_thread/thread/e4431003=
7ba355e3/91cabf9061004d0a</a></div>
<div>[2]=C2=A0<a href=3D"https://groups.google.com/group/oauth/browse_threa=
d/thread/b4d71abb0ac81e60/878a35a9d355437b">https://groups.google.com/group=
/oauth/browse_thread/thread/b4d71abb0ac81e60/878a35a9d355437b</a></div></di=
v>

--005045016740c8dfbe047dbb2cd9--

From recordond@gmail.com  Thu Jan 21 23:13:40 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A114C3A67EC for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 23:13:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.413
X-Spam-Level: 
X-Spam-Status: No, score=-2.413 tagged_above=-999 required=5 tests=[AWL=0.185,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gTOPkFya6iJM for <oauth@core3.amsl.com>; Thu, 21 Jan 2010 23:13:39 -0800 (PST)
Received: from mail-iw0-f193.google.com (mail-iw0-f193.google.com [209.85.223.193]) by core3.amsl.com (Postfix) with ESMTP id 49A2A3A67AE for <oauth@ietf.org>; Thu, 21 Jan 2010 23:13:39 -0800 (PST)
Received: by iwn31 with SMTP id 31so817132iwn.5 for <oauth@ietf.org>; Thu, 21 Jan 2010 23:13:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=6YLJRw+/3zn/+xaycdL3Ju0rwOtogTmjp5clEMCDj0w=; b=dm0WhkzLYsBqqhjGC2m1irOv/qLKGDhM4jbmyru3YHfpeIBwPr6Z8gkzzzMHXI+BfN pVxL8rIUqHPMkewBZ8NV9/aNErrtwemNJDQXtUqFirXhZLsgCCEZOpPYZrsJErJ5cwWU WlRg/3XzrHbB/PAbOAw9+eZ65/a70SbZqdyos=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=rp6mpEXW0xzCrSpW6mLftnlvMm+X0Xgf+xd/6o0gVyxIDISlnVhrxwOv4JE0RJLbSB 0bWT+H7DF+bdIySSLeO2Cp3nCoKNmpXw4cPKtfqr2+f0lJeDAHmB/LD5COzD5AP9tfWO /LX+zjynHqmqM26RXRyrr2smAZxNvyxXsSjQc=
MIME-Version: 1.0
Received: by 10.231.40.216 with SMTP id l24mr1287915ibe.40.1264144412475; Thu,  21 Jan 2010 23:13:32 -0800 (PST)
In-Reply-To: <65338608-5436-4148-9A8E-CFB52B0AF20A@gmail.com>
References: <4B588941.50603@stpeter.im> <4B58933B.5000103@stpeter.im> <65338608-5436-4148-9A8E-CFB52B0AF20A@gmail.com>
Date: Thu, 21 Jan 2010 23:13:32 -0800
Message-ID: <fd6741651001212313h57b41c4em73216c628b8194d7@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Dick Hardt <dick.hardt@gmail.com>
Content-Type: multipart/alternative; boundary=001517741146a68313047dbb8e19
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] interim meeting in ~2 hours
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jan 2010 07:13:40 -0000

--001517741146a68313047dbb8e19
Content-Type: text/plain; charset=ISO-8859-1

Hey Dick,
Realize this is after the meeting, but I've been following
http://www.ietf.org/mail-archive/web/oauth/current/msg00959.html at least
for authentication and authorization.

--David

On Thu, Jan 21, 2010 at 10:24 AM, Dick Hardt <dick.hardt@gmail.com> wrote:

> I find the break down between authentication, authorization and delegation
> referenced in the agenda confusing. I know what each of the words mean, but
> not having been part of the early IETF OAuth conversation, I'm confused with
> the breakdown as described in the agenda.
>
> Would it be appropriate to cover this in the agenda today, or is there a
> pointer so I can understand what we mean by these terms in the context of
> this WG?
>
> (sorry for the last minute question, this account was not on the mail list)
>
> -- Dick
>
> On 2010-01-21, at 9:47 AM, Peter Saint-Andre wrote:
>
> > Oh, and the proposed agenda is here:
> >
> > http://www.ietf.org/mail-archive/web/oauth/current/msg01013.html
> >
> > On 1/21/10 10:05 AM, Peter Saint-Andre wrote:
> >> This is a reminder that our first interim "virtual meeting" will start
> >> in a little under 2 hours. Logistical information is here:
> >>
> >> http://www.ietf.org/mail-archive/web/oauth/current/msg00982.html
> >>
> >> Peter
> >>
> >>
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--001517741146a68313047dbb8e19
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hey Dick,<div>Realize this is after the meeting, but I&#39;ve been followin=
g=A0<a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg00959.=
html">http://www.ietf.org/mail-archive/web/oauth/current/msg00959.html</a> =
at least for authentication and authorization.</div>
<div><br></div><div>--David<br><br><div class=3D"gmail_quote">On Thu, Jan 2=
1, 2010 at 10:24 AM, Dick Hardt <span dir=3D"ltr">&lt;<a href=3D"mailto:dic=
k.hardt@gmail.com">dick.hardt@gmail.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex;">
I find the break down between authentication, authorization and delegation =
referenced in the agenda confusing. I know what each of the words mean, but=
 not having been part of the early IETF OAuth conversation, I&#39;m confuse=
d with the breakdown as described in the agenda.<br>

<br>
Would it be appropriate to cover this in the agenda today, or is there a po=
inter so I can understand what we mean by these terms in the context of thi=
s WG?<br>
<br>
(sorry for the last minute question, this account was not on the mail list)=
<br>
<font color=3D"#888888"><br>
-- Dick<br>
</font><div><div></div><div class=3D"h5"><br>
On 2010-01-21, at 9:47 AM, Peter Saint-Andre wrote:<br>
<br>
&gt; Oh, and the proposed agenda is here:<br>
&gt;<br>
&gt; <a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg01013=
.html" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/current=
/msg01013.html</a><br>
&gt;<br>
&gt; On 1/21/10 10:05 AM, Peter Saint-Andre wrote:<br>
&gt;&gt; This is a reminder that our first interim &quot;virtual meeting&qu=
ot; will start<br>
&gt;&gt; in a little under 2 hours. Logistical information is here:<br>
&gt;&gt;<br>
&gt;&gt; <a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg0=
0982.html" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/cur=
rent/msg00982.html</a><br>
&gt;&gt;<br>
&gt;&gt; Peter<br>
&gt;&gt;<br>
&gt;&gt;<br>
&gt;<br>
</div></div><div><div></div><div class=3D"h5">&gt; ________________________=
_______________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br></div>

--001517741146a68313047dbb8e19--

From eve@xmlgrrl.com  Mon Jan 25 14:16:31 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 374A23A67DD for <oauth@core3.amsl.com>; Mon, 25 Jan 2010 14:16:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.308
X-Spam-Level: ****
X-Spam-Status: No, score=4.308 tagged_above=-999 required=5 tests=[BAYES_50=0.001, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ha618ERjgd9T for <oauth@core3.amsl.com>; Mon, 25 Jan 2010 14:16:30 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id 2CA813A67D7 for <oauth@ietf.org>; Mon, 25 Jan 2010 14:16:30 -0800 (PST)
Received: from [172.18.1.212] ([71.39.94.212]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o0PMGDHc011011 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Mon, 25 Jan 2010 14:16:36 -0800
From: Eve Maler <eve@xmlgrrl.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Date: Mon, 25 Jan 2010 14:02:54 -0800
To: OAuth WG <oauth@ietf.org>
Message-Id: <1562D46F-058C-4EE6-956C-469719CA3E81@xmlgrrl.com>
Mime-Version: 1.0 (Apple Message framework v1077)
X-Mailer: Apple Mail (2.1077)
Subject: [OAUTH-WG] FYI, UMA webinar followup
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Jan 2010 22:16:31 -0000

I think I mentioned on last week's call that those of us working on UMA =
are doing a status update in a webinar on Thursday of this week.  You're =
invited to sign up (there's a small handful of slots left).  Info and =
registration link are here:

http://kantarainitiative.org/confluence/display/uma/Meetings+and+Minutes

	Eve

Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog


From stpeter@stpeter.im  Tue Jan 26 18:05:55 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 14DEA3A6997 for <oauth@core3.amsl.com>; Tue, 26 Jan 2010 18:05:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rs77fsEbq1f9 for <oauth@core3.amsl.com>; Tue, 26 Jan 2010 18:05:54 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 429DE3A6946 for <oauth@ietf.org>; Tue, 26 Jan 2010 18:05:54 -0800 (PST)
Received: from squire.local (dsl-205-60.dynamic-dsl.frii.net [216.17.205.60]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 5EB5840329 for <oauth@ietf.org>; Tue, 26 Jan 2010 19:06:05 -0700 (MST)
Message-ID: <4B5F9F7A.7020107@stpeter.im>
Date: Tue, 26 Jan 2010 19:05:46 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms000603040902000307000908"
Subject: [OAUTH-WG] recording of first interim meeting
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Jan 2010 02:05:55 -0000

This is a cryptographically signed message in MIME format.

--------------ms000603040902000307000908
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

https://workgreen.webex.com/workgreen/lsr.php?AT=3Dpb&SP=3DMC&rID=3D36629=
07&rKey=3D39ebc5009f8c0b12

Minutes to follow in the next 24 hours.

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms000603040902000307000908
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000603040902000307000908--

From eran@hueniverse.com  Wed Jan 27 18:31:42 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5484E3A677C for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 18:31:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.392
X-Spam-Level: 
X-Spam-Status: No, score=-1.392 tagged_above=-999 required=5 tests=[AWL=1.207,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aEj1osvnoDMs for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 18:31:41 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 610EA3A68B7 for <oauth@ietf.org>; Wed, 27 Jan 2010 18:31:41 -0800 (PST)
Received: (qmail 1025 invoked from network); 28 Jan 2010 02:31:57 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 02:31:56 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Wed, 27 Jan 2010 19:31:56 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 27 Jan 2010 19:31:47 -0700
Thread-Topic: Include Normalized Request with Raw Request
Thread-Index: AcqU3aDNRQDuBUgzok2piVXruUYylgK5AIjw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D22AF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773F0E6.2D079%eran@hueniverse.com>
In-Reply-To: <C773F0E6.2D079%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Include Normalized Request with Raw Request
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 02:31:42 -0000

I would like to request a consensus call on this. So far the few people who=
 chimed in expressed their inclination not to include the normalized string=
 in the request. If no one speaks up advocating the opposite, I will contin=
ue with the current approach of normalizing the request but not including i=
t in the request.

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Eran Hammer-Lahav
> Sent: Wednesday, January 13, 2010 9:52 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Include Normalized Request with Raw Request
>=20
> Authentication Open Question #2: Should the normalized request be
> included with the request?
>=20
> In OAuth 1.0 the request is normalized into the signature base string by =
the
> client and the server. The base string itself is never sent with the requ=
est.
> Brian Eaton proposed [1] to include the signed string with the request,
> removing the need for the server to regenerate the normalized string, as
> well as allowing the client to use the included string to send additional
> (signed) information that is not part of the HTTP request.
>=20
> This is a significant departure from OAuth 1.0, but one that does call fo=
r an in-
> depth discussion.
>=20
> Some advantages to this approach are:
>=20
> - the server can easily verify what is being signed
> - the client can include additional parameters in the signed message
> - the request remains valid even if changed by proxies or other
> intermediaries
>=20
> Some disadvantages are:
>=20
> - the request is sent twice, once raw and once normalized
> - it adds another place to make mistakes and create security holes if the
> server uses the raw data without fully comparing it to the normalized
> (signed) data
> - since any server enforcing security will only use the data contained in=
 the
> normalized portion, it will create a de-facto standard for API requests (=
not
> nearly as heavy as SOAP or WS-*) in which case the request itself is
> normalized before sending.
>=20
> QUESTIONS: How do people feel about this? What are some other
> advantaged and disadvantages of this approach?
>=20
>=20
> EHL
>=20
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Wed Jan 27 18:42:53 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E9A393A687B for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 18:42:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level: 
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[AWL=0.604,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id as8I7Uk+9RNp for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 18:42:52 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id D9A3F3A68DE for <oauth@ietf.org>; Wed, 27 Jan 2010 18:42:52 -0800 (PST)
Received: (qmail 9947 invoked from network); 28 Jan 2010 02:43:09 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 02:43:09 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 27 Jan 2010 19:43:09 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: OAuth WG <oauth@ietf.org>
Date: Wed, 27 Jan 2010 19:42:59 -0700
Thread-Topic: Request Signing vs. API Signing vs. Message Signing
Thread-Index: AcqU3CPuwCqeIdaGREGtBH68H2236wK5hQDg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com>
In-Reply-To: <C773EE67.2D076%eran@hueniverse.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 02:42:54 -0000

I don't think we had enough discussion for a consensus call but I would lik=
e to continue with some combination of A and C. That means, defining a mess=
age format to normalize the request into (which can be used with XMPP and o=
ther transports), but to still process the HTTP request and not the API req=
uest into the message. In other words, not process parameters but still tur=
n the request into a message.

I will try this in my next draft.

My question: what format should we use for this message? The main four opti=
ons are:

1. XML
2. JSON
3. Form-encoded (key=3Dvalue&key=3Dvalue)
4. Text (key-value pair new line separated, or HTTP-header like key=3D"valu=
e" comma, etc.)

My thinking is: XML is crazy here (complication without benefits), JSON is =
interesting but doesn't add much value beyond other options (unless we fore=
see the need for lists or richer value types), Form-encoded is ok but has t=
o be specified due to variations in libraries (well-known OAuth issue), and=
 Text is easy but requires a custom parser and we need to choose a style.

I am inclined to use Text (key=3Dvalue LF) but can be talked into Form-enco=
ded or even JSON.

Anyone else?

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Eran Hammer-Lahav
> Sent: Wednesday, January 13, 2010 9:41 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
>=20
> Authentication Open Question #1: What to sign?
>=20
> OAuth Core 1.0 was designed to sign API requests made using common
> form-encoded formats. The main component of the 1.0 signature base string
> are the parameters. The host and HTTP methods are important but were
> never the focus on the signed content.
>=20
> draft-hammer-oauth does not change the process but does describe the
> process very differently, changing the focus form signing API requests an=
d
> parameters to signing HTTP requests (partially).
> draft-hammer-http-token-auth takes this approach a step further and
> focuses on signing the raw HTTP request components, completely ignoring
> their meaning as used by API calls. The end result is very similar but th=
e
> differences are important.
>=20
> Brian Eaton proposed [1] an alternative approach to sign messages instead=
 of
> API calls or HTTP request. In his proposal, the HTTP request (or API call=
 based
> on your perspective) in transformed into a message (in his case using a J=
SON-
> based format) which is then signed. This additional layer of abstraction =
allows
> the use of the method with other transports or use cases in which
> parameters are not sent in the request URI or body.
>=20
> QUESTION: Do you prefer:
>=20
> A. Directly processing the HTTP request into a base string for signing (d=
raft-
> hammer-oauth style).
> B. Treating the request as an API call with form-encoded parameters (OAut=
h
> 1.0 style).
> C. Converting the request into a normalized message and signing that (Eat=
on
> style).
>=20
> EHL
>=20
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From eran@hueniverse.com  Wed Jan 27 19:11:52 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 737E53A693C for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 19:11:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level: 
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[AWL=0.102,  BAYES_00=-2.599, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JDiD0h-+lXMn for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 19:11:50 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 775193A68B6 for <oauth@ietf.org>; Wed, 27 Jan 2010 19:11:50 -0800 (PST)
Received: (qmail 16677 invoked from network); 28 Jan 2010 03:12:07 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 03:12:07 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Wed, 27 Jan 2010 20:12:06 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
Date: Wed, 27 Jan 2010 20:11:57 -0700
Thread-Topic: What are the primary criteria in issuing an authentication challenge?
Thread-Index: Acqfx6ayNhU2VNG/Qvi8Kw+JpK0C4g==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 03:11:52 -0000

An authentication challenge (to make sure we are all on the same page) is s=
omething the server sends to the client when denying access to a protected =
resource. The challenge can be as simple as "use Basic", or complex as "use=
 Digest with the following parameters". OAuth 1.0 doesn't really use a chal=
lenge because it was created for cases where the API calls are preconfigure=
d and hardcoded into the client. The client should never receive an OAuth c=
hallenge the way the protocol was originally designed.

In my token authentication draft I tried to propose multiple mechanisms (no=
t fully baked yet) for issuing a challenge and allowing the client to figur=
e out what to do next. Before producing another draft, it is important to f=
igure out what challenge model we want to use. Here are the general options=
 I came up with:

1. Basic / OAuth 1.0 style - Simply say "use Token". The client is left on =
its own to figure out what to do next.

2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you need a =
new token go there". It is still not clear how this will help the client gi=
ven that getting a token is likely it include many different options, and t=
o fully address this we need to dig deep into discovery which was left out =
of scope.

3. Token attributes - the server informs the client of the kind of tokens a=
ccepted (based on their cryptographic properties or the resource-set/realm =
they are good for). This is just like #2 but with the ability for the serve=
r to support more than one token type per resource.

Question: Is the ability for a single token-protected resource to support m=
ore than one token type (say Plain+SSL *and* HMAC-256) part of our requirem=
ents? If not, there is no reason at all for the challenge to include anythi=
ng other than #1 or #2 (probably defined as a future extension).

EHL


From stpeter@stpeter.im  Wed Jan 27 19:36:11 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 66BF23A690A; Wed, 27 Jan 2010 19:36:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L-hajA+TDXrE; Wed, 27 Jan 2010 19:36:09 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 74D9A3A677C; Wed, 27 Jan 2010 19:36:09 -0800 (PST)
Received: from squire.local (dsl-205-60.dynamic-dsl.frii.net [216.17.205.60]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id A096140126; Wed, 27 Jan 2010 20:36:24 -0700 (MST)
Message-ID: <4B610627.9080609@stpeter.im>
Date: Wed, 27 Jan 2010 20:36:07 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: "proceedings@ietf.org" <proceedings@ietf.org>, OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms080606020709060700080209"
Subject: [OAUTH-WG] draft minutes of OAuth WG interim meeting, 2010-01-21
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 03:36:11 -0000

This is a cryptographically signed message in MIME format.

--------------ms080606020709060700080209
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

These are draft minutes of the OAuth WG's interim meeting held via WebEx
on 2010-01-21. Please send corrections to the chairs, Blaine Cook and
Peter Saint-Andre. Many thanks to Eve Maler for scribing.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

OAuth WG
Minutes of Interim Meeting, 2010-01-21

Chairs: Blaine Cook and Peter Saint-Andre

Scribe: Eve Maler

Minutes Editor: Peter Saint-Andre

Agenda:

http://www.ietf.org/mail-archive/web/oauth/current/msg01013.html

Audio:

https://workgreen.webex.com/workgreen/lsr.php?AT=3Dpb&SP=3DMC&rID=3D36629=
07&rKey=3D39ebc5009f8c0b12

Dramatis Personae (people who spoke during the meeting):

Richard Barnes
Blaine Cook
Lisa Dusseault
Dick Hardt
Eve Maler
Peter Saint-Andre
Hannes Tschofenig

Many other attendees, but no "blue sheets" to provide a record.

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

AGENDA

1. Introduction (5 minutes)

   a. NOTE WELL applies to interim meetings!

      http://www.ietf.org/about/note-well.html

   b. Welcome from the chairs

   c. Volunteer to scribe

      Eve Maler volunteered, many thanks!

   b. Agenda bashing

Dick: Get clarity around authentication, authorization, web delegation
concepts, and why specs are broken out the way they are.

Blaine: Much debate in the past.  Authentication is sending request with
authn information saying "This is a request that is being made by token
x."  Authorization is the issuance of that token, and a successful
request using that token once you have it.

Dick: This is confusing.  There's authn, and then there's "authentic
authorization".  The token is used to make an authorizing decision.

Blaine: Just reporting OAuth community usage.

Richard: (missed)

Hannes: Ideal to reuse terms from other communities.  E.g., see Handbook
of Applied Cryptography.

Blaine: Given the confusion around, let's clarify in the draft.

Peter: Let's give Eran an action item to do this! :-)

2. Goals of the Interim Meetings (5 minutes)

   a. Accurately describe the problem space
   b. Gather scenarios / use cases / profiles
   c. For authentication, reach *rough* consensus
   d. For authorization and delegation, determine roughly which aspects
      are "core" and which are "extensions"
   e. Make significant progress before IETF 77 in Anaheim
   f. Any others?

Peter: Blaine, Eran, I and others have talked about what to accomplish
before Anaheim.  WRAP, UMA efforts provide new input to "OAuth V2.0"
effort.  OAuth V1.0 problems have been identified.  Problem space has
shifted and expanded.  Things like splitting out authorization servers
have come to the fore.  Clarifying architectural pieces, entities, and
terminology would be good.

Hannes: Originally wanted to quickly go through some open issues and be
done with it, but then learned about WRAP and UMA.  We have a thicket of
use cases, some contradicting.  E.g., simple extensions taken as a whole
make things complicated.  Liberty Alliance didn't stay focused enough
and produced something complex.  WRAP spec is easy to understand and is
a little bit like Kerberos.

Peter: Once a new tool is available, people start using it for more
things.  Can we factor out the common features of all those ideas?

Hannes: Scenarios don't need to be a published RFC -- takes too long --
but it makes sense to do this factoring.

Peter: Many people thought OAuth V1.1 would be easy and quick.  So the
idea is to deliberately do use case work to guide the scope expansion.

Eve: UMA will submit use cases to this community shortly.

Peter: The WRAP work that people like Dick, David, Allen, and Brian have
done could be seen from one angle -- the profile work -- as use cases.

Dick: WRAP motivations were looking at OAuth and giving it slightly
different architectural parameters in solving similar design patterns.
E.g., at scale, it helps to let the protected resource work with an
authorization server.  And using TLS as an alternative.  Agrees with the
idea of using a process to collect use cases.  Taking into account
implementation and deployment effort is good.  WRAP can work well for
people who have SSL, and original OAuth can work well when SSL isn't
available.  Existing libraries for OAuth are still there.
Architecturally, OAuth and WRAP are quite different.  In WRAP, the
client gets a token directly from the authorizing server.

Eve: Useful to see the use cases for each difference, to understand the
benefit of each.  E.g., SSL provides channel security but not data
origin authentication.

Peter: Using the photo site/photo printing example, there are only
simple access choices.  But if the protected resource (WRAP term) has a
number of possible actions on it, the scope of authorization may need to
be more sophisticated.  Maybe those solutions need to be extensions on
top -- or not.

Blaine: Maybe do a feature matrix of what each of us thinks our protocol
supports, then as a community build a common understanding.

Eve: FWIW, here is the UMA technology comparison matrix:

http://kantarainitiative.org/confluence/display/uma/Technology+Matrix

No WRAP column yet.  Note that UMA layers on top of three OAuth
instances, "using" OAuth rather than being an alternative.  If more
functionality sediments down, that's great.

?: Security features are hard to argue about, because it depends so
heavily on deployment details.  Channel security can be there at a lower
layer, but data origin authentication happens at a higher layer.

Peter: Use cases are therefore critical.

Eve: Yes, use "agile specification" to ensure each feature can be traced
back to solving a use case.

?: At what level to specify use cases?  The photo example is so broad it
can accommodate lots of solutions.

Peter: SSL isn't a use case. :-)

Hannes: Assumptions such as having certificates available can be baked
into use case alternatives.  E.g., if you have an iPhone app with
certain constraints, that motivates the use case sufficiently.

[following agenda items covered above or delayed until next meeting]

3. Problem Space (10 minutes)

   a. Need a clearer definition of what we're trying to solve
   b. Has the problem shifted since OAuth 1.0?
   c. What problem are we solving now?
   d. Can we settle on consistent terminology, please? :)
   e. Architecture matters

3. Scenarios (15 minutes)

   a. Core scenarios, see draft-ietf-oauth-web-delegation-01
   b. Scenarios from WRAP, see draft-hardt-oauth-01
   c. Scenarios from User Managed Access (UMA), I-D on the way?
   d. How can we gather other scenarios?

6. Authentication (10 minutes)

   a. draft-ietf-oauth-authentication
   b. Open issues

7. Authorization and Delegation (10 minutes)

   a. What is core?
   b. What can we define as extensions?

8. Action Items (5 minutes)

   a. Gather more scenarios
   b. Review draft-ietf-oauth-authentication and work through
      remaining issues
   c. Input on authorization and delegation
   d. Time of next interim meeting

Peter: What are next steps and action items?  Rough consensus: Get
more scenarios, use cases, and profiles on the table, and discuss
further what level they should be at.  Also, let's put together a
matrix.

Dick: Let's also get agreement on terms, so we can avoid confusion in
the matrix.

All: Agree!

Richard: Is the goal to allow a user to delegate access to a
resource?  Is this the common thread?

Dick: No, it's not.

Peter: Why not?

Dick: The first two WRAP profiles, where the client is acting
autonomously, don't match that description.

Eve: And the classic two-legged flow also differs.  Is that on the
table for OAuth V2.0?

Paul: The "two-legged" flow is still to get an access token
provisioned, so it might utilize the whole delegation flow but
apply to an autonomous client.

JeffH: Don't use "legs"; those refer to a flow diagram.

Blaine: And depending on the "legs", you could have flows with a
consumer token and no user token, and vice versa.  So those are
two separate use cases to consider.

Dick: This is all why we see the use cases as broader than "user
delegation".  And BTW, we need clarity on token terminology!

Peter: There's a plethora of authentication technologies, so I'm
leery of offering OAuth as YAAT.  If HTTP needs some better
options, this seems to be where Eran was going with his authn
draft.  That's all okay, but let's be clear if we're doing that.
The registration aspect is also interesting; IETF hasn't developed
anything like this.  In addition to the traditional delegation flows,
let's figure out the true value of the underlying functions that are
part of OAuth.

Lisa: The OAuth BOF seemed to show that the HTTP group has a pent-up
desire for better authentication options, and this would be valuable to
do.  Patching SASL onto HTTP has seen enormous work, but has failed.
A limited-scope task of binding a well-known authentication mechanism to
HTTP, improving on Basic and Digest, would be welcomed.

Peter: Agreed.  At this point, chairs will drill down on action items
for terminology, matrix, etc.  The group can use the wiki for some of
this work.  Meetings need two-week notice, so we'll meet again in two
weeks.  The current plan is to hold the next meeting on February 4.

http://trac.tools.ietf.org/wg/oauth/trac/wiki

Blaine: There are people not on today's call who would be good to have
on future calls.  Maybe we can do a Doodle poll to pick a better time.

Peter: Spoke to a number of folks who simply couldn't make it this time,
including Eran.  Thanks to those who have contributed to date!

All: Meeting was helpful and productive.  Thanks!

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D




--------------ms080606020709060700080209
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms080606020709060700080209--

From recordond@gmail.com  Wed Jan 27 20:36:20 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1C4FE3A6991 for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 20:36:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WJiJ4q49UCXb for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 20:36:19 -0800 (PST)
Received: from mail-iw0-f184.google.com (mail-iw0-f184.google.com [209.85.223.184]) by core3.amsl.com (Postfix) with ESMTP id 01A173A690A for <oauth@ietf.org>; Wed, 27 Jan 2010 20:36:18 -0800 (PST)
Received: by iwn14 with SMTP id 14so349436iwn.17 for <oauth@ietf.org>; Wed, 27 Jan 2010 20:36:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=0hjhTZMAw3Ez3K9dOoqVo7N3D42VNVxQwL9kE2t1P0Q=; b=Qbyr1gClWuAQzQuM/SFo7hSu6hjiHlwBwvrlQLmgxl/6cM9iqZkyyuf9GKp2k0zCxe w7SyH8W17Sdp00GexNw10hMp86qIAYlSE+ceeTn3OkGiYO3XuHNWbIn4GsAwhLGL3iUg zvCA/aH6bfV9GBfuvHAYQfhv00aKvjCgxM8wQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=uWkQXi0RFijTvwt1NYEUn06F+Ogw7tQBT+BQB4YFX9uahHjLv4i6RYsaelrtuD/za6 PquGK1VCML9cP/smRuDZfTM7mXF73cWpCzSXqlf2Ce2UBuHBNhKK6AS3KatTtgcqmwGe NkInXhkUCJE6fwYuh6ZndssmKzFlFBFZsJmOQ=
MIME-Version: 1.0
Received: by 10.231.144.201 with SMTP id a9mr196709ibv.69.1264653391562; Wed,  27 Jan 2010 20:36:31 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Wed, 27 Jan 2010 20:36:31 -0800
Message-ID: <fd6741651001272036n39d2533bod95a7ea4fb24b154@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=001485e9a9e22b08a1047e321055
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 04:36:20 -0000

--001485e9a9e22b08a1047e321055
Content-Type: text/plain; charset=ISO-8859-1

I'm in the #1 camp from a simplicity standpoint.  Even if you're able to
discover an API endpoint (ala #2), you're still going to need to know more
than just how to authorize in order to make successful API requests.  This
isn't to say that we won't get there, but I think we're still a ways off.

--David

On Wed, Jan 27, 2010 at 7:11 PM, Eran Hammer-Lahav <eran@hueniverse.com>wrote:

> An authentication challenge (to make sure we are all on the same page) is
> something the server sends to the client when denying access to a protected
> resource. The challenge can be as simple as "use Basic", or complex as "use
> Digest with the following parameters". OAuth 1.0 doesn't really use a
> challenge because it was created for cases where the API calls are
> preconfigured and hardcoded into the client. The client should never receive
> an OAuth challenge the way the protocol was originally designed.
>
> In my token authentication draft I tried to propose multiple mechanisms
> (not fully baked yet) for issuing a challenge and allowing the client to
> figure out what to do next. Before producing another draft, it is important
> to figure out what challenge model we want to use. Here are the general
> options I came up with:
>
> 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is left on
> its own to figure out what to do next.
>
> 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you need a
> new token go there". It is still not clear how this will help the client
> given that getting a token is likely it include many different options, and
> to fully address this we need to dig deep into discovery which was left out
> of scope.
>
> 3. Token attributes - the server informs the client of the kind of tokens
> accepted (based on their cryptographic properties or the resource-set/realm
> they are good for). This is just like #2 but with the ability for the server
> to support more than one token type per resource.
>
> Question: Is the ability for a single token-protected resource to support
> more than one token type (say Plain+SSL *and* HMAC-256) part of our
> requirements? If not, there is no reason at all for the challenge to include
> anything other than #1 or #2 (probably defined as a future extension).
>
> EHL
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--001485e9a9e22b08a1047e321055
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I&#39;m in the #1 camp from a simplicity standpoint. =A0Even if you&#39;re =
able to discover an API endpoint (ala #2), you&#39;re still going to need t=
o know more than just how to authorize in order to make successful API requ=
ests. =A0This isn&#39;t to say that we won&#39;t get there, but I think we&=
#39;re still a ways off.<div>
<br></div><div>--David<br><br><div class=3D"gmail_quote">On Wed, Jan 27, 20=
10 at 7:11 PM, Eran Hammer-Lahav <span dir=3D"ltr">&lt;<a href=3D"mailto:er=
an@hueniverse.com">eran@hueniverse.com</a>&gt;</span> wrote:<br><blockquote=
 class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc soli=
d;padding-left:1ex;">
An authentication challenge (to make sure we are all on the same page) is s=
omething the server sends to the client when denying access to a protected =
resource. The challenge can be as simple as &quot;use Basic&quot;, or compl=
ex as &quot;use Digest with the following parameters&quot;. OAuth 1.0 doesn=
&#39;t really use a challenge because it was created for cases where the AP=
I calls are preconfigured and hardcoded into the client. The client should =
never receive an OAuth challenge the way the protocol was originally design=
ed.<br>

<br>
In my token authentication draft I tried to propose multiple mechanisms (no=
t fully baked yet) for issuing a challenge and allowing the client to figur=
e out what to do next. Before producing another draft, it is important to f=
igure out what challenge model we want to use. Here are the general options=
 I came up with:<br>

<br>
1. Basic / OAuth 1.0 style - Simply say &quot;use Token&quot;. The client i=
s left on its own to figure out what to do next.<br>
<br>
2. Basic / OAuth 1.0 + simple discovery - Say &quot;use Token and if you ne=
ed a new token go there&quot;. It is still not clear how this will help the=
 client given that getting a token is likely it include many different opti=
ons, and to fully address this we need to dig deep into discovery which was=
 left out of scope.<br>

<br>
3. Token attributes - the server informs the client of the kind of tokens a=
ccepted (based on their cryptographic properties or the resource-set/realm =
they are good for). This is just like #2 but with the ability for the serve=
r to support more than one token type per resource.<br>

<br>
Question: Is the ability for a single token-protected resource to support m=
ore than one token type (say Plain+SSL *and* HMAC-256) part of our requirem=
ents? If not, there is no reason at all for the challenge to include anythi=
ng other than #1 or #2 (probably defined as a future extension).<br>

<br>
EHL<br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br></div>

--001485e9a9e22b08a1047e321055--

From email@pbryan.net  Wed Jan 27 20:44:06 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1D0923A690A for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 20:44:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lFjIXQLdsvJH for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 20:44:05 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id 552573A6806 for <oauth@ietf.org>; Wed, 27 Jan 2010 20:44:05 -0800 (PST)
Received: from [192.168.0.6] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id 718D7EA022 for <oauth@ietf.org>; Thu, 28 Jan 2010 04:44:21 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"
Date: Wed, 27 Jan 2010 20:44:20 -0800
Message-ID: <1264653860.4804.8.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 04:44:06 -0000

I'm in the #1 camp too. Is it wrong for me to think that discovering
what type(s) of token are acceptable and how to obtain them should be
the domain of XRD?

Paul

On Wed, 2010-01-27 at 20:11 -0700, Eran Hammer-Lahav wrote:
> An authentication challenge (to make sure we are all on the same page) is something the server sends to the client when denying access to a protected resource. The challenge can be as simple as "use Basic", or complex as "use Digest with the following parameters". OAuth 1.0 doesn't really use a challenge because it was created for cases where the API calls are preconfigured and hardcoded into the client. The client should never receive an OAuth challenge the way the protocol was originally designed.
> 
> In my token authentication draft I tried to propose multiple mechanisms (not fully baked yet) for issuing a challenge and allowing the client to figure out what to do next. Before producing another draft, it is important to figure out what challenge model we want to use. Here are the general options I came up with:
> 
> 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is left on its own to figure out what to do next.
> 
> 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you need a new token go there". It is still not clear how this will help the client given that getting a token is likely it include many different options, and to fully address this we need to dig deep into discovery which was left out of scope.
> 
> 3. Token attributes - the server informs the client of the kind of tokens accepted (based on their cryptographic properties or the resource-set/realm they are good for). This is just like #2 but with the ability for the server to support more than one token type per resource.
> 
> Question: Is the ability for a single token-protected resource to support more than one token type (say Plain+SSL *and* HMAC-256) part of our requirements? If not, there is no reason at all for the challenge to include anything other than #1 or #2 (probably defined as a future extension).
> 
> EHL
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From rbarnes@bbn.com  Wed Jan 27 20:55:02 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 62CB53A691F for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 20:55:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eKTznctXM73u for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 20:54:57 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id D37363A659B for <oauth@ietf.org>; Wed, 27 Jan 2010 20:54:56 -0800 (PST)
Received: from [128.89.254.82] (helo=[192.168.1.45]) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1NaMPQ-00008P-BX; Wed, 27 Jan 2010 23:55:12 -0500
Message-Id: <F61645D1-7578-419D-A1E8-970BB137D64E@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Wed, 27 Jan 2010 23:55:11 -0500
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Mailer: Apple Mail (2.936)
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 04:55:02 -0000

I'm in the "1.5" camp -- "Use Token with HMAC-SHA256".  There's no  
point to specifying acceptable tokens, since from the perspective of  
the authentication protocol, the token is an opaque string.  But it  
would be a good idea to specify what the parameters for the  
authentication should be.  The critical parameter is of course the  
signature algorithm the server will accept (I'm OK with just allowing  
one), but you might also provide a valid range for timestamps.

--Richard


On Jan 27, 2010, at 10:11 PM, Eran Hammer-Lahav wrote:

> An authentication challenge (to make sure we are all on the same  
> page) is something the server sends to the client when denying  
> access to a protected resource. The challenge can be as simple as  
> "use Basic", or complex as "use Digest with the following  
> parameters". OAuth 1.0 doesn't really use a challenge because it was  
> created for cases where the API calls are preconfigured and  
> hardcoded into the client. The client should never receive an OAuth  
> challenge the way the protocol was originally designed.
>
> In my token authentication draft I tried to propose multiple  
> mechanisms (not fully baked yet) for issuing a challenge and  
> allowing the client to figure out what to do next. Before producing  
> another draft, it is important to figure out what challenge model we  
> want to use. Here are the general options I came up with:
>
> 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is  
> left on its own to figure out what to do next.
>
> 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you  
> need a new token go there". It is still not clear how this will help  
> the client given that getting a token is likely it include many  
> different options, and to fully address this we need to dig deep  
> into discovery which was left out of scope.
>
> 3. Token attributes - the server informs the client of the kind of  
> tokens accepted (based on their cryptographic properties or the  
> resource-set/realm they are good for). This is just like #2 but with  
> the ability for the server to support more than one token type per  
> resource.
>
> Question: Is the ability for a single token-protected resource to  
> support more than one token type (say Plain+SSL *and* HMAC-256) part  
> of our requirements? If not, there is no reason at all for the  
> challenge to include anything other than #1 or #2 (probably defined  
> as a future extension).
>
> EHL
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From eran@hueniverse.com  Wed Jan 27 22:02:45 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B6B313A69CA for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 22:02:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[AWL=0.001,  BAYES_00=-2.599, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 083Fr4fJZjGJ for <oauth@core3.amsl.com>; Wed, 27 Jan 2010 22:02:43 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id BA7F33A659A for <oauth@ietf.org>; Wed, 27 Jan 2010 22:02:43 -0800 (PST)
Received: (qmail 492 invoked from network); 28 Jan 2010 06:02:59 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 06:02:59 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Wed, 27 Jan 2010 23:02:04 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Date: Wed, 27 Jan 2010 23:01:55 -0700
Thread-Topic: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
Thread-Index: Acqf1h3AbaB8fIoISzKPUbbMGO2wbAACNUMA
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D22DA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F61645D1-7578-419D-A1E8-970BB137D64E@bbn.com>
In-Reply-To: <F61645D1-7578-419D-A1E8-970BB137D64E@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 06:02:45 -0000

Not really. The algorithm is part of the token not the challenge. Either yo=
u have a token for this resource or not, and if you have one, it tells you =
which algorithm to use. In other words, when you get a token, it comes with=
 the algorithms it supports (if more than one) and whatever secrets require=
d executing it. When the client gets the challenge, it makes no difference =
what the challenge includes because the token attributes dictate the rest.

I am assuming there isn't a need for a server to issue a token with multipl=
e algorithm and then letting individual resources narrow it down.

EHL

> -----Original Message-----
> From: Richard L. Barnes [mailto:rbarnes@bbn.com]
> Sent: Wednesday, January 27, 2010 8:55 PM
> To: Eran Hammer-Lahav
> Cc: OAuth WG (oauth@ietf.org)
> Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an
> authentication challenge?
>=20
> I'm in the "1.5" camp -- "Use Token with HMAC-SHA256".  There's no point =
to
> specifying acceptable tokens, since from the perspective of the
> authentication protocol, the token is an opaque string.  But it would be =
a
> good idea to specify what the parameters for the authentication should be=
.
> The critical parameter is of course the signature algorithm the server wi=
ll
> accept (I'm OK with just allowing one), but you might also provide a vali=
d
> range for timestamps.
>=20
> --Richard
>=20
>=20
> On Jan 27, 2010, at 10:11 PM, Eran Hammer-Lahav wrote:
>=20
> > An authentication challenge (to make sure we are all on the same
> > page) is something the server sends to the client when denying access
> > to a protected resource. The challenge can be as simple as "use
> > Basic", or complex as "use Digest with the following parameters".
> > OAuth 1.0 doesn't really use a challenge because it was created for
> > cases where the API calls are preconfigured and hardcoded into the
> > client. The client should never receive an OAuth challenge the way the
> > protocol was originally designed.
> >
> > In my token authentication draft I tried to propose multiple
> > mechanisms (not fully baked yet) for issuing a challenge and allowing
> > the client to figure out what to do next. Before producing another
> > draft, it is important to figure out what challenge model we want to
> > use. Here are the general options I came up with:
> >
> > 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is
> > left on its own to figure out what to do next.
> >
> > 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you
> > need a new token go there". It is still not clear how this will help
> > the client given that getting a token is likely it include many
> > different options, and to fully address this we need to dig deep into
> > discovery which was left out of scope.
> >
> > 3. Token attributes - the server informs the client of the kind of
> > tokens accepted (based on their cryptographic properties or the
> > resource-set/realm they are good for). This is just like #2 but with
> > the ability for the server to support more than one token type per
> > resource.
> >
> > Question: Is the ability for a single token-protected resource to
> > support more than one token type (say Plain+SSL *and* HMAC-256) part
> > of our requirements? If not, there is no reason at all for the
> > challenge to include anything other than #1 or #2 (probably defined as
> > a future extension).
> >
> > EHL
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth


From faynberg@alcatel-lucent.com  Thu Jan 28 01:28:16 2010
Return-Path: <faynberg@alcatel-lucent.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1EE243A6A0B for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 01:28:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.333
X-Spam-Level: 
X-Spam-Status: No, score=-0.333 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, J_CHICKENPOX_53=0.6, SARE_FWDLOOK=1.666]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iFXuRFDi4GCE for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 01:28:15 -0800 (PST)
Received: from ihemail3.lucent.com (ihemail3.lucent.com [135.245.0.37]) by core3.amsl.com (Postfix) with ESMTP id 656AB3A6845 for <oauth@ietf.org>; Thu, 28 Jan 2010 01:28:14 -0800 (PST)
Received: from umail.lucent.com (h135-3-40-63.lucent.com [135.3.40.63]) by ihemail3.lucent.com (8.13.8/IER-o) with ESMTP id o0S9STIq024440 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 28 Jan 2010 03:28:29 -0600 (CST)
Received: from [135.244.226.138] (faynberg.lra.lucent.com [135.244.226.138]) by umail.lucent.com (8.13.8/TPES) with ESMTP id o0S9SRc6027165; Thu, 28 Jan 2010 03:28:28 -0600 (CST)
Message-ID: <4B6158BB.7030109@alcatel-lucent.com>
Date: Thu, 28 Jan 2010 04:28:27 -0500
From: Igor Faynberg <faynberg@alcatel-lucent.com>
Organization: Alcatel-Lucent
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Eran Hammer-Lahav <eran@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Scanned-By: MIMEDefang 2.57 on 135.245.2.37
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: faynberg@alcatel-lucent.com
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 09:28:16 -0000

Eran Hammer-Lahav wrote:
> Question: Is the ability for a single token-protected resource to support more than one token type (say Plain+SSL *and* HMAC-256) part of our requirements? If not, there is no reason at all for the challenge to include anything other than #1 or #2 (probably defined as a future extension).
>
>   

A good question!  I never thought about that before.  I tend to think 
that it is better to be forward-looking and support more than one token 
type.

Igor

From rbarnes@bbn.com  Thu Jan 28 06:55:56 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 87AD43A6962 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 06:55:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2UvjI2xqLqQk for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 06:55:55 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by core3.amsl.com (Postfix) with ESMTP id 9FB553A693F for <oauth@ietf.org>; Thu, 28 Jan 2010 06:55:55 -0800 (PST)
Received: from [192.1.255.186] (helo=col-dhcp-192-1-255-186.bbn.com) by smtp.bbn.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <rbarnes@bbn.com>) id 1NaVn3-000Fvw-6l; Thu, 28 Jan 2010 09:56:13 -0500
Message-Id: <EA0D5A88-DA31-4404-BED7-0F6EECF60A8D@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22DA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 28 Jan 2010 09:56:12 -0500
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F61645D1-7578-419D-A1E8-970BB137D64E@bbn.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22DA@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Mailer: Apple Mail (2.936)
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 14:55:56 -0000

So you're assuming that somewhere in the process of token issuance,  
the client gets told what algorithm to use and remembers it.

When is this assumption true?  I don't see where it happens in the  
OAuth delegation procedure (there's no "use this algorithm" field in  
responses that issue tokens/secrets). And if Token auth is being used  
as a general authentication mechanism, the token secret might just be  
something like a password, which the user remembers, not the UA, so  
the UA would need to be informed somehow (by the user or the server)  
of what signing algorithm to apply.

--Richard



On Jan 28, 2010, at 1:01 AM, Eran Hammer-Lahav wrote:

> Not really. The algorithm is part of the token not the challenge.  
> Either you have a token for this resource or not, and if you have  
> one, it tells you which algorithm to use. In other words, when you  
> get a token, it comes with the algorithms it supports (if more than  
> one) and whatever secrets required executing it. When the client  
> gets the challenge, it makes no difference what the challenge  
> includes because the token attributes dictate the rest.
>
> I am assuming there isn't a need for a server to issue a token with  
> multiple algorithm and then letting individual resources narrow it  
> down.
>
> EHL
>
>> -----Original Message-----
>> From: Richard L. Barnes [mailto:rbarnes@bbn.com]
>> Sent: Wednesday, January 27, 2010 8:55 PM
>> To: Eran Hammer-Lahav
>> Cc: OAuth WG (oauth@ietf.org)
>> Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an
>> authentication challenge?
>>
>> I'm in the "1.5" camp -- "Use Token with HMAC-SHA256".  There's no  
>> point to
>> specifying acceptable tokens, since from the perspective of the
>> authentication protocol, the token is an opaque string.  But it  
>> would be a
>> good idea to specify what the parameters for the authentication  
>> should be.
>> The critical parameter is of course the signature algorithm the  
>> server will
>> accept (I'm OK with just allowing one), but you might also provide  
>> a valid
>> range for timestamps.
>>
>> --Richard
>>
>>
>> On Jan 27, 2010, at 10:11 PM, Eran Hammer-Lahav wrote:
>>
>>> An authentication challenge (to make sure we are all on the same
>>> page) is something the server sends to the client when denying  
>>> access
>>> to a protected resource. The challenge can be as simple as "use
>>> Basic", or complex as "use Digest with the following parameters".
>>> OAuth 1.0 doesn't really use a challenge because it was created for
>>> cases where the API calls are preconfigured and hardcoded into the
>>> client. The client should never receive an OAuth challenge the way  
>>> the
>>> protocol was originally designed.
>>>
>>> In my token authentication draft I tried to propose multiple
>>> mechanisms (not fully baked yet) for issuing a challenge and  
>>> allowing
>>> the client to figure out what to do next. Before producing another
>>> draft, it is important to figure out what challenge model we want to
>>> use. Here are the general options I came up with:
>>>
>>> 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is
>>> left on its own to figure out what to do next.
>>>
>>> 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you
>>> need a new token go there". It is still not clear how this will help
>>> the client given that getting a token is likely it include many
>>> different options, and to fully address this we need to dig deep  
>>> into
>>> discovery which was left out of scope.
>>>
>>> 3. Token attributes - the server informs the client of the kind of
>>> tokens accepted (based on their cryptographic properties or the
>>> resource-set/realm they are good for). This is just like #2 but with
>>> the ability for the server to support more than one token type per
>>> resource.
>>>
>>> Question: Is the ability for a single token-protected resource to
>>> support more than one token type (say Plain+SSL *and* HMAC-256) part
>>> of our requirements? If not, there is no reason at all for the
>>> challenge to include anything other than #1 or #2 (probably  
>>> defined as
>>> a future extension).
>>>
>>> EHL
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>


From onyxraven@gmail.com  Thu Jan 28 07:15:32 2010
Return-Path: <onyxraven@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id EE37E3A69A2 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:15:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FzXydNRVyrrR for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:15:30 -0800 (PST)
Received: from mail-yx0-f194.google.com (mail-yx0-f194.google.com [209.85.210.194]) by core3.amsl.com (Postfix) with ESMTP id 682AC3A6A16 for <oauth@ietf.org>; Thu, 28 Jan 2010 07:15:30 -0800 (PST)
Received: by yxe32 with SMTP id 32so654025yxe.5 for <oauth@ietf.org>; Thu, 28 Jan 2010 07:15:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:cc:content-type; bh=qTIS0CgZ3HzIdogQ8zOfwBEiu7otaEZ1pzbVIx/H7pE=; b=YMO2LKWF0dpWt+4+UGaA0RmdEpujn91jTv/7U9sZMR1FKr/S3Sa7pfNWDXpAbHlJJP eIbfhznqewoEYNOVDf93GQBeMHYZ7pqQoGejY245gvDhyMzy6iZadA25RJpxEjIUL9Og a33KTiX1KYiZox63qtv5HYgiWF5Abt+8kbl18=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=U2g0MgVUAb01Dqk59vQg5ArMpoqLXvbAhODczZqIXFlbO5opAGS+qcl3C9Nz/3C7nz VhyY8bZVrVq45w6eokrlU4QxPv8P0UXu8ZWwbRXOtISLVGIymHJlUxnUHC3H7gvUUNkE L8hEc3TNb17YOfpn5IP8PX+pUdATUq9WKg+FY=
MIME-Version: 1.0
Received: by 10.151.24.13 with SMTP id b13mr929254ybj.179.1264691746077; Thu,  28 Jan 2010 07:15:46 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Justin Hart <onyxraven@gmail.com>
Date: Thu, 28 Jan 2010 08:15:26 -0700
Message-ID: <c5eeec031001280715x61e843a0u3ed25e0b1c8132d2@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=000e0cd304c8467aa6047e3afe6a
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 15:15:32 -0000

--000e0cd304c8467aa6047e3afe6a
Content-Type: text/plain; charset=ISO-8859-1

I'm inclined to say #1 to JSON because its rules are well defined
(especially escaping and delimiters) and the parsers are widely available
and relatively standard.  It really has little more complication than other
key-value forms. I say #2 to form-encoded because though there have been
issues, again, the form is defined.  Picking an already defined format
should avoid most parser trouble.

On Wed, Jan 27, 2010 at 7:42 PM, Eran Hammer-Lahav <eran@hueniverse.com>wrote:

> I don't think we had enough discussion for a consensus call but I would
> like to continue with some combination of A and C. That means, defining a
> message format to normalize the request into (which can be used with XMPP
> and other transports), but to still process the HTTP request and not the API
> request into the message. In other words, not process parameters but still
> turn the request into a message.
>
> I will try this in my next draft.
>
> My question: what format should we use for this message? The main four
> options are:
>
> 1. XML
> 2. JSON
> 3. Form-encoded (key=value&key=value)
> 4. Text (key-value pair new line separated, or HTTP-header like key="value"
> comma, etc.)
>
> My thinking is: XML is crazy here (complication without benefits), JSON is
> interesting but doesn't add much value beyond other options (unless we
> foresee the need for lists or richer value types), Form-encoded is ok but
> has to be specified due to variations in libraries (well-known OAuth issue),
> and Text is easy but requires a custom parser and we need to choose a style.
>
> I am inclined to use Text (key=value LF) but can be talked into
> Form-encoded or even JSON.
>
> Anyone else?
>
> EHL
>
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Eran Hammer-Lahav
> > Sent: Wednesday, January 13, 2010 9:41 PM
> > To: OAuth WG
> > Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
> >
> > Authentication Open Question #1: What to sign?
> >
> > OAuth Core 1.0 was designed to sign API requests made using common
> > form-encoded formats. The main component of the 1.0 signature base string
> > are the parameters. The host and HTTP methods are important but were
> > never the focus on the signed content.
> >
> > draft-hammer-oauth does not change the process but does describe the
> > process very differently, changing the focus form signing API requests
> and
> > parameters to signing HTTP requests (partially).
> > draft-hammer-http-token-auth takes this approach a step further and
> > focuses on signing the raw HTTP request components, completely ignoring
> > their meaning as used by API calls. The end result is very similar but
> the
> > differences are important.
> >
> > Brian Eaton proposed [1] an alternative approach to sign messages instead
> of
> > API calls or HTTP request. In his proposal, the HTTP request (or API call
> based
> > on your perspective) in transformed into a message (in his case using a
> JSON-
> > based format) which is then signed. This additional layer of abstraction
> allows
> > the use of the method with other transports or use cases in which
> > parameters are not sent in the request URI or body.
> >
> > QUESTION: Do you prefer:
> >
> > A. Directly processing the HTTP request into a base string for signing
> (draft-
> > hammer-oauth style).
> > B. Treating the request as an API call with form-encoded parameters
> (OAuth
> > 1.0 style).
> > C. Converting the request into a normalized message and signing that
> (Eaton
> > style).
> >
> > EHL
> >
> > [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
> >
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--000e0cd304c8467aa6047e3afe6a
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

I&#39;m inclined to say #1 to JSON because its rules are well defined (espe=
cially escaping and delimiters) and the parsers are widely available and re=
latively standard. =A0It really has little more complication than other key=
-value forms. I say=A0#2 to form-encoded because though there have been iss=
ues, again, the form is defined.=A0=A0Picking an already defined format sho=
uld avoid most parser trouble.<br>

<br><div class=3D"gmail_quote">On Wed, Jan 27, 2010 at 7:42 PM, Eran Hammer=
-Lahav <span dir=3D"ltr">&lt;<a href=3D"mailto:eran@hueniverse.com">eran@hu=
eniverse.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">

I don&#39;t think we had enough discussion for a consensus call but I would=
 like to continue with some combination of A and C. That means, defining a =
message format to normalize the request into (which can be used with XMPP a=
nd other transports), but to still process the HTTP request and not the API=
 request into the message. In other words, not process parameters but still=
 turn the request into a message.<br>


<br>
I will try this in my next draft.<br>
<br>
My question: what format should we use for this message? The main four opti=
ons are:<br>
<br>
1. XML<br>
2. JSON<br>
3. Form-encoded (key=3Dvalue&amp;key=3Dvalue)<br>
4. Text (key-value pair new line separated, or HTTP-header like key=3D&quot=
;value&quot; comma, etc.)<br>
<br>
My thinking is: XML is crazy here (complication without benefits), JSON is =
interesting but doesn&#39;t add much value beyond other options (unless we =
foresee the need for lists or richer value types), Form-encoded is ok but h=
as to be specified due to variations in libraries (well-known OAuth issue),=
 and Text is easy but requires a custom parser and we need to choose a styl=
e.<br>


<br>
I am inclined to use Text (key=3Dvalue LF) but can be talked into Form-enco=
ded or even JSON.<br>
<br>
Anyone else?<br>
<br>
EHL<br>
<br>
&gt; -----Original Message-----<br>
&gt; From: <a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.org=
</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org">oauth-bounces@ietf.o=
rg</a>] On Behalf<br>
&gt; Of Eran Hammer-Lahav<br>
&gt; Sent: Wednesday, January 13, 2010 9:41 PM<br>
&gt; To: OAuth WG<br>
&gt; Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signin=
g<br>
&gt;<br>
&gt; Authentication Open Question #1: What to sign?<br>
&gt;<br>
&gt; OAuth Core 1.0 was designed to sign API requests made using common<br>
&gt; form-encoded formats. The main component of the 1.0 signature base str=
ing<br>
&gt; are the parameters. The host and HTTP methods are important but were<b=
r>
&gt; never the focus on the signed content.<br>
&gt;<br>
&gt; draft-hammer-oauth does not change the process but does describe the<b=
r>
&gt; process very differently, changing the focus form signing API requests=
 and<br>
&gt; parameters to signing HTTP requests (partially).<br>
&gt; draft-hammer-http-token-auth takes this approach a step further and<br=
>
&gt; focuses on signing the raw HTTP request components, completely ignorin=
g<br>
&gt; their meaning as used by API calls. The end result is very similar but=
 the<br>
&gt; differences are important.<br>
&gt;<br>
&gt; Brian Eaton proposed [1] an alternative approach to sign messages inst=
ead of<br>
&gt; API calls or HTTP request. In his proposal, the HTTP request (or API c=
all based<br>
&gt; on your perspective) in transformed into a message (in his case using =
a JSON-<br>
&gt; based format) which is then signed. This additional layer of abstracti=
on allows<br>
&gt; the use of the method with other transports or use cases in which<br>
&gt; parameters are not sent in the request URI or body.<br>
&gt;<br>
&gt; QUESTION: Do you prefer:<br>
&gt;<br>
&gt; A. Directly processing the HTTP request into a base string for signing=
 (draft-<br>
&gt; hammer-oauth style).<br>
&gt; B. Treating the request as an API call with form-encoded parameters (O=
Auth<br>
&gt; 1.0 style).<br>
&gt; C. Converting the request into a normalized message and signing that (=
Eaton<br>
&gt; style).<br>
&gt;<br>
&gt; EHL<br>
&gt;<br>
&gt; [1] <a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg0=
0890.html" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth/cur=
rent/msg00890.html</a><br>
&gt;<br>
&gt; _______________________________________________<br>
&gt; OAuth mailing list<br>
&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/oauth</a><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</blockquote></div><br>

--000e0cd304c8467aa6047e3afe6a--

From lshepard@facebook.com  Thu Jan 28 07:20:59 2010
Return-Path: <lshepard@facebook.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 918483A6957 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:20:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.264
X-Spam-Level: 
X-Spam-Status: No, score=-6.264 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mw9YhdNJnsTH for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:20:58 -0800 (PST)
Received: from mailout-sf2p.facebook.com (mailout-snc1.facebook.com [69.63.179.25]) by core3.amsl.com (Postfix) with ESMTP id 033CA3A680E for <oauth@ietf.org>; Thu, 28 Jan 2010 07:20:57 -0800 (PST)
Received: from mail.thefacebook.com ([192.168.18.105]) by pp02.snc1.tfbnw.net (8.14.3/8.14.3) with ESMTP id o0SFKmmV023465 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Thu, 28 Jan 2010 07:20:48 -0800
Received: from SC-MBXC1.TheFacebook.com ([192.168.18.100]) by sc-hub02.TheFacebook.com ([192.168.18.105]) with mapi; Thu, 28 Jan 2010 07:21:12 -0800
From: Luke Shepard <lshepard@facebook.com>
To: Justin Hart <onyxraven@gmail.com>, Eran Hammer-Lahav <eran@hueniverse.com>
Date: Thu, 28 Jan 2010 07:21:10 -0800
Thread-Topic: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
Thread-Index: AcqgLMyc5W15FldOT3WCM6PwRmFQ6wAALh2v
Message-ID: <C786EB66.1C7AD%lshepard@facebook.com>
In-Reply-To: <c5eeec031001280715x61e843a0u3ed25e0b1c8132d2@mail.gmail.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C786EB661C7ADlshepardfacebookcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2010-01-28_09:2010-01-20, 2010-01-28, 2010-01-28 signatures=0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 15:20:59 -0000

--_000_C786EB661C7ADlshepardfacebookcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

+1 to JSON. Custom parser is difficult and JSON adds very little overhead t=
o the data.

On 1/28/10 7:15 AM, "Justin Hart" <onyxraven@gmail.com> wrote:

I'm inclined to say #1 to JSON because its rules are well defined (especial=
ly escaping and delimiters) and the parsers are widely available and relati=
vely standard.  It really has little more complication than other key-value=
 forms. I say #2 to form-encoded because though there have been issues, aga=
in, the form is defined.  Picking an already defined format should avoid mo=
st parser trouble.

On Wed, Jan 27, 2010 at 7:42 PM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
I don't think we had enough discussion for a consensus call but I would lik=
e to continue with some combination of A and C. That means, defining a mess=
age format to normalize the request into (which can be used with XMPP and o=
ther transports), but to still process the HTTP request and not the API req=
uest into the message. In other words, not process parameters but still tur=
n the request into a message.

I will try this in my next draft.

My question: what format should we use for this message? The main four opti=
ons are:

1. XML
2. JSON
3. Form-encoded (key=3Dvalue&key=3Dvalue)
4. Text (key-value pair new line separated, or HTTP-header like key=3D"valu=
e" comma, etc.)

My thinking is: XML is crazy here (complication without benefits), JSON is =
interesting but doesn't add much value beyond other options (unless we fore=
see the need for lists or richer value types), Form-encoded is ok but has t=
o be specified due to variations in libraries (well-known OAuth issue), and=
 Text is easy but requires a custom parser and we need to choose a style.

I am inclined to use Text (key=3Dvalue LF) but can be talked into Form-enco=
ded or even JSON.

Anyone else?

EHL

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Eran Hammer-Lahav
> Sent: Wednesday, January 13, 2010 9:41 PM
> To: OAuth WG
> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
>
> Authentication Open Question #1: What to sign?
>
> OAuth Core 1.0 was designed to sign API requests made using common
> form-encoded formats. The main component of the 1.0 signature base string
> are the parameters. The host and HTTP methods are important but were
> never the focus on the signed content.
>
> draft-hammer-oauth does not change the process but does describe the
> process very differently, changing the focus form signing API requests an=
d
> parameters to signing HTTP requests (partially).
> draft-hammer-http-token-auth takes this approach a step further and
> focuses on signing the raw HTTP request components, completely ignoring
> their meaning as used by API calls. The end result is very similar but th=
e
> differences are important.
>
> Brian Eaton proposed [1] an alternative approach to sign messages instead=
 of
> API calls or HTTP request. In his proposal, the HTTP request (or API call=
 based
> on your perspective) in transformed into a message (in his case using a J=
SON-
> based format) which is then signed. This additional layer of abstraction =
allows
> the use of the method with other transports or use cases in which
> parameters are not sent in the request URI or body.
>
> QUESTION: Do you prefer:
>
> A. Directly processing the HTTP request into a base string for signing (d=
raft-
> hammer-oauth style).
> B. Treating the request as an API call with form-encoded parameters (OAut=
h
> 1.0 style).
> C. Converting the request into a normalized message and signing that (Eat=
on
> style).
>
> EHL
>
> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth



--_000_C786EB661C7ADlshepardfacebookcom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing</=
TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:=
11pt'>+1 to JSON. Custom parser is difficult and JSON adds very little over=
head to the data.<BR>
<BR>
On 1/28/10 7:15 AM, &quot;Justin Hart&quot; &lt;<a href=3D"onyxraven@gmail.=
com">onyxraven@gmail.com</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'>I'm inclined to say #1 to JSON because its =
rules are well defined (especially escaping and delimiters) and the parsers=
 are widely available and relatively standard. =A0It really has little more=
 complication than other key-value forms. I say=A0#2 to form-encoded becaus=
e though there have been issues, again, the form is defined.=A0=A0Picking a=
n already defined format should avoid most parser trouble.<BR>
<BR>
On Wed, Jan 27, 2010 at 7:42 PM, Eran Hammer-Lahav &lt;<a href=3D"eran@huen=
iverse.com">eran@hueniverse.com</a>&gt; wrote:<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'>I don't think we had enough discussion for =
a consensus call but I would like to continue with some combination of A an=
d C. That means, defining a message format to normalize the request into (w=
hich can be used with XMPP and other transports), but to still process the =
HTTP request and not the API request into the message. In other words, not =
process parameters but still turn the request into a message.<BR>
<BR>
I will try this in my next draft.<BR>
<BR>
My question: what format should we use for this message? The main four opti=
ons are:<BR>
<BR>
1. XML<BR>
2. JSON<BR>
3. Form-encoded (key=3Dvalue&amp;key=3Dvalue)<BR>
4. Text (key-value pair new line separated, or HTTP-header like key=3D&quot=
;value&quot; comma, etc.)<BR>
<BR>
My thinking is: XML is crazy here (complication without benefits), JSON is =
interesting but doesn't add much value beyond other options (unless we fore=
see the need for lists or richer value types), Form-encoded is ok but has t=
o be specified due to variations in libraries (well-known OAuth issue), and=
 Text is easy but requires a custom parser and we need to choose a style.<B=
R>
<BR>
I am inclined to use Text (key=3Dvalue LF) but can be talked into Form-enco=
ded or even JSON.<BR>
<BR>
Anyone else?<BR>
<BR>
EHL<BR>
<BR>
&gt; -----Original Message-----<BR>
&gt; From: <a href=3D"oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<=
a href=3D"mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>]=
 On Behalf<BR>
&gt; Of Eran Hammer-Lahav<BR>
&gt; Sent: Wednesday, January 13, 2010 9:41 PM<BR>
&gt; To: OAuth WG<BR>
&gt; Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signin=
g<BR>
&gt;<BR>
&gt; Authentication Open Question #1: What to sign?<BR>
&gt;<BR>
&gt; OAuth Core 1.0 was designed to sign API requests made using common<BR>
&gt; form-encoded formats. The main component of the 1.0 signature base str=
ing<BR>
&gt; are the parameters. The host and HTTP methods are important but were<B=
R>
&gt; never the focus on the signed content.<BR>
&gt;<BR>
&gt; draft-hammer-oauth does not change the process but does describe the<B=
R>
&gt; process very differently, changing the focus form signing API requests=
 and<BR>
&gt; parameters to signing HTTP requests (partially).<BR>
&gt; draft-hammer-http-token-auth takes this approach a step further and<BR=
>
&gt; focuses on signing the raw HTTP request components, completely ignorin=
g<BR>
&gt; their meaning as used by API calls. The end result is very similar but=
 the<BR>
&gt; differences are important.<BR>
&gt;<BR>
&gt; Brian Eaton proposed [1] an alternative approach to sign messages inst=
ead of<BR>
&gt; API calls or HTTP request. In his proposal, the HTTP request (or API c=
all based<BR>
&gt; on your perspective) in transformed into a message (in his case using =
a JSON-<BR>
&gt; based format) which is then signed. This additional layer of abstracti=
on allows<BR>
&gt; the use of the method with other transports or use cases in which<BR>
&gt; parameters are not sent in the request URI or body.<BR>
&gt;<BR>
&gt; QUESTION: Do you prefer:<BR>
&gt;<BR>
&gt; A. Directly processing the HTTP request into a base string for signing=
 (draft-<BR>
&gt; hammer-oauth style).<BR>
&gt; B. Treating the request as an API call with form-encoded parameters (O=
Auth<BR>
&gt; 1.0 style).<BR>
&gt; C. Converting the request into a normalized message and signing that (=
Eaton<BR>
&gt; style).<BR>
&gt;<BR>
&gt; EHL<BR>
&gt;<BR>
&gt; [1] <a href=3D"http://www.ietf.org/mail-archive/web/oauth/current/msg0=
0890.html">http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html=
</a><BR>
&gt;<BR>
&gt; _______________________________________________<BR>
&gt; OAuth mailing list<BR>
&gt; <a href=3D"OAuth@ietf.org">OAuth@ietf.org</a><BR>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ie=
tf.org/mailman/listinfo/oauth</a><BR>
_______________________________________________<BR>
OAuth mailing list<BR>
<a href=3D"OAuth@ietf.org">OAuth@ietf.org</a><BR>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><BR>
</SPAN></FONT></BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial=
"><SPAN STYLE=3D'font-size:11pt'><BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C786EB661C7ADlshepardfacebookcom_--

From lshepard@facebook.com  Thu Jan 28 07:29:30 2010
Return-Path: <lshepard@facebook.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0509B3A680E for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:29:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.964
X-Spam-Level: 
X-Spam-Status: No, score=-5.964 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jNKsH-3rQlb9 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:29:20 -0800 (PST)
Received: from mailout-snc1.facebook.com (mailout-snc1.facebook.com [69.63.179.25]) by core3.amsl.com (Postfix) with ESMTP id 1C15F3A67F6 for <oauth@ietf.org>; Thu, 28 Jan 2010 07:29:20 -0800 (PST)
Received: from mail.thefacebook.com ([192.168.18.104]) by pp01.snc1.tfbnw.net (8.14.3/8.14.3) with ESMTP id o0SFTQgv023200 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT) for <oauth@ietf.org>; Thu, 28 Jan 2010 07:29:26 -0800
Received: from sc-hub05.TheFacebook.com (192.168.18.82) by sc-hub01.TheFacebook.com (192.168.18.104) with Microsoft SMTP Server (TLS) id 8.2.213.0; Thu, 28 Jan 2010 07:29:38 -0800
Received: from SC-MBXC1.TheFacebook.com ([192.168.18.100]) by sc-hub05.TheFacebook.com ([192.168.18.82]) with mapi; Thu, 28 Jan 2010 07:29:38 -0800
From: Luke Shepard <lshepard@facebook.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 28 Jan 2010 07:29:38 -0800
Thread-Topic: Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgLrPcaO2rzz8E5kqUBQr+cLgtyw==
Message-ID: <C786ED62.1C7AF%lshepard@facebook.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C786ED621C7AFlshepardfacebookcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2010-01-28_09:2010-01-20, 2010-01-28, 2010-01-28 signatures=0
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 15:29:30 -0000

--_000_C786ED621C7AFlshepardfacebookcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform

--_000_C786ED621C7AFlshepardfacebookcom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Discussion of SSL as the primary means for OAuth communication</TITL=
E>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:=
11pt'>In the discussions around the OAuth WRAP spec, one of the questions o=
ften asked is, &#8220;why use SSL exclusively?&#8221; Several of us have do=
ne a lot of thinking on it and I wanted to articulate my understanding of t=
he pros and cons of the approach for discussion. The use case I primarily h=
ave in mind is that of a web service, like Facebook, Twitter, or Google ser=
vices. Our service is primarily authenticated via the Web, but we have a us=
e for all of the WRAP profiles (web app, client app, desktop, mobile).<BR>
&nbsp;<BR>
Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.<BR>
<BR>
=3D=3D Advantages of using SSL for API calls<BR>
<BR>
-- It&#8217;s overwhelmingly simpler for developers.<BR>
I&#8217;ve implemented OpenID and OAuth, and I&#8217;ve worked for years wi=
th developers trying to handle signatures on the Facebook Platform. In my e=
xperience, calculating signatures is one of the most complex and difficult =
parts of an authentication protocol, and developers often get it wrong. By =
moving that piece down the stack we can get it out of their way and let dev=
elopers focus on building their apps.<BR>
<BR>
-- Existing tools ecosystem<BR>
It&#8217;s not that SSL is a simpler encryption protocol than OAuth (it&#82=
17;s not) but rather that commonly available tools almost universally suppo=
rt it &#8211; every major web browser, as well as most libraries for making=
 HTTP requests (like curl) have built-in support for SSL. For OAuth 1.0, yo=
u need to use a client library just to construct your very first request.<B=
R>
<BR>
-- Smaller client libraries<BR>
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding. <BR>
<BR>
Wouldn&#8217;t it be great if we could write a protocol that doesn&#8217;t =
even require a client library to implement? If I could just make an authent=
icated API request in my browser, as easily as with Basic Auth?<BR>
<BR>
=3D=3D Disadvantages of using SSL for API calls<BR>
<BR>
-- Difficulties of debugging<BR>
<BR>
Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can&#8217;t sniff a request, and to intercept it=
, you need an HTTP proxy that understands SSL, and you need to worry about =
invalid certificate errors. To aid in this, providers will probably offer a=
 non-SSL endpoint for debugging, but they may need to set up a sandbox envi=
ronment to prevent damage from tokens exposed in plaintext.<BR>
<BR>
-- Variable costs for providers<BR>
<BR>
Server CPU costs will increase when handling SSL requests &#8211; especiall=
y on every API call instead of just at the auth stage. At scale, this can b=
ecome expensive, although it can be offset by using specialized hardware to=
 terminate the SSL connection. All the big companies I&#8217;ve talked to a=
re comfortable trading these higher costs for increased adoption due to the=
 simplicity.<BR>
<BR>
-- Fixed costs for smaller providers<BR>
<BR>
There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.<BR>
<BR>
-- Latency<BR>
<BR>
SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it&#8217;s less of a con=
cern. Already today newer phones can handle SSL just fine.<BR>
<BR>
-- Browser limitations for cross domain communication<BR>
<BR>
A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.<BR>
<BR>
-- Verifying information on the relying party<BR>
<BR>
If information is passed from a Service Provider to a Consumer through the =
user&#8217;s browser, then that information cannot be verified without an A=
PI call, unless a signature is provided. Similar to stateful vs. stateless =
mode in the OpenID 2.0 spec, the signature can serve as a performance enhan=
cement to avoid an API call.<BR>
<BR>
=3D=3D Providing a non-SSL option for the short head<BR>
<BR>
Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.<BR>
<BR>
Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.<BR>
<BR>
However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it&#8217;s pretty important that OAuth 2.=
0 support a method other than SSL as an option for advanced developers. But=
 it should be just that &#8211; an option, and only for advanced developers=
, so that beginning programmers and folks learning an API don&#8217;t need =
to worry about signatures when they just want to play around.<BR>
<BR>
Please let me know if I&#8217;m missing something or if my assumptions soun=
d incorrect.<BR>
<BR>
-Luke Shepard<BR>
Software Engineer, Facebook Platform<BR>
</SPAN></FONT>
</BODY>
</HTML>


--_000_C786ED621C7AFlshepardfacebookcom_--

From rbarnes@bbn.com  Thu Jan 28 07:30:17 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 370803A680E for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:30:17 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[AWL=0.150,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fz6prKApI8wG for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:30:16 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 016C33A67F6 for <oauth@ietf.org>; Thu, 28 Jan 2010 07:30:16 -0800 (PST)
Received: from [192.1.255.186] (helo=col-dhcp-192-1-255-186.bbn.com) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1NaWKH-0003Wk-CN; Thu, 28 Jan 2010 10:30:34 -0500
Message-Id: <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 28 Jan 2010 10:30:33 -0500
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 15:30:17 -0000

It's not clear that XML is always crazy.  If you're integrating this  
into an XMPP client, it's already used to using XML (i.e., it's  
already got a parser/generator), and might not have JSON machinery.

I would suggest pinning down a data model that gets serialized to  
different formats depending on the protocol.  You're going to have to  
define how OAuth fits into a different protocol anyway, so if there's  
a set of defined serializations, you can just add a line to that  
definition that says "use X serialization".

--Richard


On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:

> I don't think we had enough discussion for a consensus call but I  
> would like to continue with some combination of A and C. That means,  
> defining a message format to normalize the request into (which can  
> be used with XMPP and other transports), but to still process the  
> HTTP request and not the API request into the message. In other  
> words, not process parameters but still turn the request into a  
> message.
>
> I will try this in my next draft.
>
> My question: what format should we use for this message? The main  
> four options are:
>
> 1. XML
> 2. JSON
> 3. Form-encoded (key=value&key=value)
> 4. Text (key-value pair new line separated, or HTTP-header like  
> key="value" comma, etc.)
>
> My thinking is: XML is crazy here (complication without benefits),  
> JSON is interesting but doesn't add much value beyond other options  
> (unless we foresee the need for lists or richer value types), Form- 
> encoded is ok but has to be specified due to variations in libraries  
> (well-known OAuth issue), and Text is easy but requires a custom  
> parser and we need to choose a style.
>
> I am inclined to use Text (key=value LF) but can be talked into Form- 
> encoded or even JSON.
>
> Anyone else?
>
> EHL
>
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On  
>> Behalf
>> Of Eran Hammer-Lahav
>> Sent: Wednesday, January 13, 2010 9:41 PM
>> To: OAuth WG
>> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message  
>> Signing
>>
>> Authentication Open Question #1: What to sign?
>>
>> OAuth Core 1.0 was designed to sign API requests made using common
>> form-encoded formats. The main component of the 1.0 signature base  
>> string
>> are the parameters. The host and HTTP methods are important but were
>> never the focus on the signed content.
>>
>> draft-hammer-oauth does not change the process but does describe the
>> process very differently, changing the focus form signing API  
>> requests and
>> parameters to signing HTTP requests (partially).
>> draft-hammer-http-token-auth takes this approach a step further and
>> focuses on signing the raw HTTP request components, completely  
>> ignoring
>> their meaning as used by API calls. The end result is very similar  
>> but the
>> differences are important.
>>
>> Brian Eaton proposed [1] an alternative approach to sign messages  
>> instead of
>> API calls or HTTP request. In his proposal, the HTTP request (or  
>> API call based
>> on your perspective) in transformed into a message (in his case  
>> using a JSON-
>> based format) which is then signed. This additional layer of  
>> abstraction allows
>> the use of the method with other transports or use cases in which
>> parameters are not sent in the request URI or body.
>>
>> QUESTION: Do you prefer:
>>
>> A. Directly processing the HTTP request into a base string for  
>> signing (draft-
>> hammer-oauth style).
>> B. Treating the request as an API call with form-encoded parameters  
>> (OAuth
>> 1.0 style).
>> C. Converting the request into a normalized message and signing  
>> that (Eaton
>> style).
>>
>> EHL
>>
>> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From stpeter@stpeter.im  Thu Jan 28 07:40:34 2010
Return-Path: <stpeter@stpeter.im>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 966143A6A0F for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:40:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.211
X-Spam-Level: 
X-Spam-Status: No, score=-2.211 tagged_above=-999 required=5 tests=[AWL=-0.389, BAYES_00=-2.599, SARE_UNSUB38=0.777]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MAT3rAZ70mNW for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 07:40:33 -0800 (PST)
Received: from stpeter.im (stpeter.im [207.210.219.233]) by core3.amsl.com (Postfix) with ESMTP id 6F64B3A6943 for <oauth@ietf.org>; Thu, 28 Jan 2010 07:40:32 -0800 (PST)
Received: from squire.local (dsl-205-60.dynamic-dsl.frii.net [216.17.205.60]) (Authenticated sender: stpeter) by stpeter.im (Postfix) with ESMTPSA id 2EB8940126 for <oauth@ietf.org>; Thu, 28 Jan 2010 08:40:50 -0700 (MST)
Message-ID: <4B61AFF0.6060302@stpeter.im>
Date: Thu, 28 Jan 2010 08:40:32 -0700
From: Peter Saint-Andre <stpeter@stpeter.im>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: OAuth WG <oauth@ietf.org>
X-Enigmail-Version: 1.0
OpenPGP: url=http://www.saint-andre.com/me/stpeter.asc
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms030405000307050607090004"
Subject: [OAUTH-WG] terminology
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 15:40:34 -0000

This is a cryptographically signed message in MIME format.

--------------ms030405000307050607090004
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

One of the topics discussed during our conference call last week was the
matter of terminology. All agreed that we need to gain clarity and
consensus regarding the terms we use. To help us achieve that, I've
created a stub wiki page:

http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms

If you don't yet have a wiki account, please go here:

http://tools.ietf.org/newlogin

Peter

--=20
Peter Saint-Andre
https://stpeter.im/




--------------ms030405000307050607090004
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms030405000307050607090004--

From john.hurliman@intel.com  Thu Jan 28 09:35:29 2010
Return-Path: <john.hurliman@intel.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8264A3A67BD for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 09:35:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level: 
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NbKkpeZEOML3 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 09:35:28 -0800 (PST)
Received: from mga14.intel.com (mga14.intel.com [143.182.124.37]) by core3.amsl.com (Postfix) with ESMTP id 64C7D3A6A97 for <oauth@ietf.org>; Thu, 28 Jan 2010 09:35:28 -0800 (PST)
Received: from azsmga001.ch.intel.com ([10.2.17.19]) by azsmga102.ch.intel.com with ESMTP; 28 Jan 2010 09:35:47 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.47,316,1257148800"; d="scan'208";a="237907525"
Received: from rrsmsx603.amr.corp.intel.com ([10.31.0.57]) by azsmga001.ch.intel.com with ESMTP; 28 Jan 2010 09:35:47 -0800
Received: from rrsmsx506.amr.corp.intel.com ([10.31.0.39]) by rrsmsx603.amr.corp.intel.com ([10.31.0.57]) with mapi; Thu, 28 Jan 2010 10:35:44 -0700
From: "Hurliman, John" <john.hurliman@intel.com>
To: Luke Shepard <lshepard@facebook.com>
Date: Thu, 28 Jan 2010 10:35:34 -0700
Thread-Topic: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
Thread-Index: AcqgQFFloSA21OY8QHSceiP6NzNr7w==
Message-ID: <A10C4D5B-7C58-4B2E-AA8C-4443D09FDFA8@intel.com>
References: <C786EB66.1C7AD%lshepard@facebook.com>
In-Reply-To: <C786EB66.1C7AD%lshepard@facebook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: Justin Hart <onyxraven@gmail.com>, OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 17:35:29 -0000
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From eran@hueniverse.com  Thu Jan 28 10:06:31 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7E8BE3A6941 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 10:06:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.298
X-Spam-Level: 
X-Spam-Status: No, score=-2.298 tagged_above=-999 required=5 tests=[AWL=0.301,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qV+BeNKtm912 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 10:06:30 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 6AC973A6915 for <oauth@ietf.org>; Thu, 28 Jan 2010 10:06:30 -0800 (PST)
Received: (qmail 3141 invoked from network); 28 Jan 2010 18:06:46 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 18:06:46 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Thu, 28 Jan 2010 11:06:37 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Date: Thu, 28 Jan 2010 11:06:23 -0700
Thread-Topic: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
Thread-Index: AcqgRKHeof9ZzC4sTjyxNJ4FTBSilA==
Message-ID: <3706407C-4381-43F9-AC66-4B9F64B21584@hueniverse.com>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com>
In-Reply-To: <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 18:06:31 -0000

This defeats the point of having a unified message format across =20
different transports. And since the message itself is not sent on the =20
wire, the benefit to XMPP isn't that significant.

Also, we are only talking about construction, not parsing. So =20
technically, no lib is really needed in either case (but can be useful =20
for data type encoding).

EHL

On Jan 28, 2010, at 7:30, "Richard L. Barnes" <rbarnes@bbn.com> wrote:

> It's not clear that XML is always crazy.  If you're integrating this
> into an XMPP client, it's already used to using XML (i.e., it's
> already got a parser/generator), and might not have JSON machinery.
>
> I would suggest pinning down a data model that gets serialized to
> different formats depending on the protocol.  You're going to have to
> define how OAuth fits into a different protocol anyway, so if there's
> a set of defined serializations, you can just add a line to that
> definition that says "use X serialization".
>
> --Richard
>
>
> On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:
>
>> I don't think we had enough discussion for a consensus call but I
>> would like to continue with some combination of A and C. That means,
>> defining a message format to normalize the request into (which can
>> be used with XMPP and other transports), but to still process the
>> HTTP request and not the API request into the message. In other
>> words, not process parameters but still turn the request into a
>> message.
>>
>> I will try this in my next draft.
>>
>> My question: what format should we use for this message? The main
>> four options are:
>>
>> 1. XML
>> 2. JSON
>> 3. Form-encoded (key=3Dvalue&key=3Dvalue)
>> 4. Text (key-value pair new line separated, or HTTP-header like
>> key=3D"value" comma, etc.)
>>
>> My thinking is: XML is crazy here (complication without benefits),
>> JSON is interesting but doesn't add much value beyond other options
>> (unless we foresee the need for lists or richer value types), Form-
>> encoded is ok but has to be specified due to variations in libraries
>> (well-known OAuth issue), and Text is easy but requires a custom
>> parser and we need to choose a style.
>>
>> I am inclined to use Text (key=3Dvalue LF) but can be talked into Form-
>> encoded or even JSON.
>>
>> Anyone else?
>>
>> EHL
>>
>>> -----Original Message-----
>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
>>> Behalf
>>> Of Eran Hammer-Lahav
>>> Sent: Wednesday, January 13, 2010 9:41 PM
>>> To: OAuth WG
>>> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
>>> Signing
>>>
>>> Authentication Open Question #1: What to sign?
>>>
>>> OAuth Core 1.0 was designed to sign API requests made using common
>>> form-encoded formats. The main component of the 1.0 signature base
>>> string
>>> are the parameters. The host and HTTP methods are important but were
>>> never the focus on the signed content.
>>>
>>> draft-hammer-oauth does not change the process but does describe the
>>> process very differently, changing the focus form signing API
>>> requests and
>>> parameters to signing HTTP requests (partially).
>>> draft-hammer-http-token-auth takes this approach a step further and
>>> focuses on signing the raw HTTP request components, completely
>>> ignoring
>>> their meaning as used by API calls. The end result is very similar
>>> but the
>>> differences are important.
>>>
>>> Brian Eaton proposed [1] an alternative approach to sign messages
>>> instead of
>>> API calls or HTTP request. In his proposal, the HTTP request (or
>>> API call based
>>> on your perspective) in transformed into a message (in his case
>>> using a JSON-
>>> based format) which is then signed. This additional layer of
>>> abstraction allows
>>> the use of the method with other transports or use cases in which
>>> parameters are not sent in the request URI or body.
>>>
>>> QUESTION: Do you prefer:
>>>
>>> A. Directly processing the HTTP request into a base string for
>>> signing (draft-
>>> hammer-oauth style).
>>> B. Treating the request as an API call with form-encoded parameters
>>> (OAuth
>>> 1.0 style).
>>> C. Converting the request into a normalized message and signing
>>> that (Eaton
>>> style).
>>>
>>> EHL
>>>
>>> [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
>>>
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>

From rbarnes@bbn.com  Thu Jan 28 11:31:55 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A27793A67C0 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 11:31:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.499
X-Spam-Level: 
X-Spam-Status: No, score=-2.499 tagged_above=-999 required=5 tests=[AWL=0.100,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mZk8+mqsQOLc for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 11:31:54 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id 456673A6909 for <oauth@ietf.org>; Thu, 28 Jan 2010 11:31:54 -0800 (PST)
Received: from [192.1.255.186] (helo=col-dhcp-192-1-255-186.bbn.com) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1Naa68-0001vk-Bj; Thu, 28 Jan 2010 14:32:12 -0500
Message-Id: <B2406664-D322-4EDC-A032-7882EFBF214E@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <3706407C-4381-43F9-AC66-4B9F64B21584@hueniverse.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 28 Jan 2010 14:32:11 -0500
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com> <3706407C-4381-43F9-AC66-4B9F64B21584@hueniverse.com>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 19:31:55 -0000

Ah, ok, I misunderstood the context of your reference to XMPP.  So the  
question at hand here is: How do you construct the thing you're going  
to sign?

Assuming that's the question, then the critical thing is that the  
format be canonical (or at least canonicalizable).  That always seems  
easier for simpler formats, so my inclination would be toward either  
form-encoding or a custom format (3 or 4), since these define precise  
rules for how things fit together.  After that, a tight profile of  
JSON might be workable (e.g., no white space); XML is probably too  
much of a hassle.

--Richard



On Jan 28, 2010, at 1:06 PM, Eran Hammer-Lahav wrote:

> This defeats the point of having a unified message format across
> different transports. And since the message itself is not sent on the
> wire, the benefit to XMPP isn't that significant.
>
> Also, we are only talking about construction, not parsing. So
> technically, no lib is really needed in either case (but can be useful
> for data type encoding).
>
> EHL
>
> On Jan 28, 2010, at 7:30, "Richard L. Barnes" <rbarnes@bbn.com> wrote:
>
>> It's not clear that XML is always crazy.  If you're integrating this
>> into an XMPP client, it's already used to using XML (i.e., it's
>> already got a parser/generator), and might not have JSON machinery.
>>
>> I would suggest pinning down a data model that gets serialized to
>> different formats depending on the protocol.  You're going to have to
>> define how OAuth fits into a different protocol anyway, so if there's
>> a set of defined serializations, you can just add a line to that
>> definition that says "use X serialization".
>>
>> --Richard
>>
>>
>> On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:
>>
>>> I don't think we had enough discussion for a consensus call but I
>>> would like to continue with some combination of A and C. That means,
>>> defining a message format to normalize the request into (which can
>>> be used with XMPP and other transports), but to still process the
>>> HTTP request and not the API request into the message. In other
>>> words, not process parameters but still turn the request into a
>>> message.
>>>
>>> I will try this in my next draft.
>>>
>>> My question: what format should we use for this message? The main
>>> four options are:
>>>
>>> 1. XML
>>> 2. JSON
>>> 3. Form-encoded (key=value&key=value)
>>> 4. Text (key-value pair new line separated, or HTTP-header like
>>> key="value" comma, etc.)
>>>
>>> My thinking is: XML is crazy here (complication without benefits),
>>> JSON is interesting but doesn't add much value beyond other options
>>> (unless we foresee the need for lists or richer value types), Form-
>>> encoded is ok but has to be specified due to variations in libraries
>>> (well-known OAuth issue), and Text is easy but requires a custom
>>> parser and we need to choose a style.
>>>
>>> I am inclined to use Text (key=value LF) but can be talked into  
>>> Form-
>>> encoded or even JSON.
>>>
>>> Anyone else?
>>>
>>> EHL
>>>
>>>> -----Original Message-----
>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
>>>> Behalf
>>>> Of Eran Hammer-Lahav
>>>> Sent: Wednesday, January 13, 2010 9:41 PM
>>>> To: OAuth WG
>>>> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
>>>> Signing
>>>>
>>>> Authentication Open Question #1: What to sign?
>>>>
>>>> OAuth Core 1.0 was designed to sign API requests made using common
>>>> form-encoded formats. The main component of the 1.0 signature base
>>>> string
>>>> are the parameters. The host and HTTP methods are important but  
>>>> were
>>>> never the focus on the signed content.
>>>>
>>>> draft-hammer-oauth does not change the process but does describe  
>>>> the
>>>> process very differently, changing the focus form signing API
>>>> requests and
>>>> parameters to signing HTTP requests (partially).
>>>> draft-hammer-http-token-auth takes this approach a step further and
>>>> focuses on signing the raw HTTP request components, completely
>>>> ignoring
>>>> their meaning as used by API calls. The end result is very similar
>>>> but the
>>>> differences are important.
>>>>
>>>> Brian Eaton proposed [1] an alternative approach to sign messages
>>>> instead of
>>>> API calls or HTTP request. In his proposal, the HTTP request (or
>>>> API call based
>>>> on your perspective) in transformed into a message (in his case
>>>> using a JSON-
>>>> based format) which is then signed. This additional layer of
>>>> abstraction allows
>>>> the use of the method with other transports or use cases in which
>>>> parameters are not sent in the request URI or body.
>>>>
>>>> QUESTION: Do you prefer:
>>>>
>>>> A. Directly processing the HTTP request into a base string for
>>>> signing (draft-
>>>> hammer-oauth style).
>>>> B. Treating the request as an API call with form-encoded parameters
>>>> (OAuth
>>>> 1.0 style).
>>>> C. Converting the request into a normalized message and signing
>>>> that (Eaton
>>>> style).
>>>>
>>>> EHL
>>>>
>>>> [1] http://www.ietf.org/mail-archive/web/oauth/current/ 
>>>> msg00890.html
>>>>
>>>> _______________________________________________
>>>> OAuth mailing list
>>>> OAuth@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/oauth
>>> _______________________________________________
>>> OAuth mailing list
>>> OAuth@ietf.org
>>> https://www.ietf.org/mailman/listinfo/oauth
>>


From eran@hueniverse.com  Thu Jan 28 13:00:42 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CC6073A6947 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:00:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.341
X-Spam-Level: 
X-Spam-Status: No, score=-2.341 tagged_above=-999 required=5 tests=[AWL=0.258,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eYapcN0keQtI for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:00:41 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 853273A67B2 for <oauth@ietf.org>; Thu, 28 Jan 2010 13:00:41 -0800 (PST)
Received: (qmail 16805 invoked from network); 28 Jan 2010 21:01:00 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 21:00:59 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 28 Jan 2010 14:00:48 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Date: Thu, 28 Jan 2010 14:00:42 -0700
Thread-Topic: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
Thread-Index: AcqgUJkaWzyK7XiYTSyTr57DjMUFPAADBtEg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D24A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com> <3706407C-4381-43F9-AC66-4B9F64B21584@hueniverse.com> <B2406664-D322-4EDC-A032-7882EFBF214E@bbn.com>
In-Reply-To: <B2406664-D322-4EDC-A032-7882EFBF214E@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 21:00:42 -0000

That's exactly it.

This is why JSON is not my top priority because people will see 'use JSON' =
and ignore the profile (no whitespace) and will fail.

Those of you who picked JSON, does this change your mind? If we use JSON, I=
 expect many existing libraries that produce JSON objects to fail because o=
f the differences in how they add whitespace.

EHL

> -----Original Message-----
> From: Richard L. Barnes [mailto:rbarnes@bbn.com]
> Sent: Thursday, January 28, 2010 11:32 AM
> To: Eran Hammer-Lahav
> Cc: OAuth WG
> Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message
> Signing
>=20
> Ah, ok, I misunderstood the context of your reference to XMPP.  So the
> question at hand here is: How do you construct the thing you're going to
> sign?
>=20
> Assuming that's the question, then the critical thing is that the format =
be
> canonical (or at least canonicalizable).  That always seems easier for si=
mpler
> formats, so my inclination would be toward either form-encoding or a
> custom format (3 or 4), since these define precise rules for how things f=
it
> together.  After that, a tight profile of JSON might be workable (e.g., n=
o
> white space); XML is probably too much of a hassle.
>=20
> --Richard
>=20
>=20
>=20
> On Jan 28, 2010, at 1:06 PM, Eran Hammer-Lahav wrote:
>=20
> > This defeats the point of having a unified message format across
> > different transports. And since the message itself is not sent on the
> > wire, the benefit to XMPP isn't that significant.
> >
> > Also, we are only talking about construction, not parsing. So
> > technically, no lib is really needed in either case (but can be useful
> > for data type encoding).
> >
> > EHL
> >
> > On Jan 28, 2010, at 7:30, "Richard L. Barnes" <rbarnes@bbn.com> wrote:
> >
> >> It's not clear that XML is always crazy.  If you're integrating this
> >> into an XMPP client, it's already used to using XML (i.e., it's
> >> already got a parser/generator), and might not have JSON machinery.
> >>
> >> I would suggest pinning down a data model that gets serialized to
> >> different formats depending on the protocol.  You're going to have to
> >> define how OAuth fits into a different protocol anyway, so if there's
> >> a set of defined serializations, you can just add a line to that
> >> definition that says "use X serialization".
> >>
> >> --Richard
> >>
> >>
> >> On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:
> >>
> >>> I don't think we had enough discussion for a consensus call but I
> >>> would like to continue with some combination of A and C. That means,
> >>> defining a message format to normalize the request into (which can
> >>> be used with XMPP and other transports), but to still process the
> >>> HTTP request and not the API request into the message. In other
> >>> words, not process parameters but still turn the request into a
> >>> message.
> >>>
> >>> I will try this in my next draft.
> >>>
> >>> My question: what format should we use for this message? The main
> >>> four options are:
> >>>
> >>> 1. XML
> >>> 2. JSON
> >>> 3. Form-encoded (key=3Dvalue&key=3Dvalue) 4. Text (key-value pair new
> >>> line separated, or HTTP-header like key=3D"value" comma, etc.)
> >>>
> >>> My thinking is: XML is crazy here (complication without benefits),
> >>> JSON is interesting but doesn't add much value beyond other options
> >>> (unless we foresee the need for lists or richer value types), Form-
> >>> encoded is ok but has to be specified due to variations in libraries
> >>> (well-known OAuth issue), and Text is easy but requires a custom
> >>> parser and we need to choose a style.
> >>>
> >>> I am inclined to use Text (key=3Dvalue LF) but can be talked into
> >>> Form-
> >>> encoded or even JSON.
> >>>
> >>> Anyone else?
> >>>
> >>> EHL
> >>>
> >>>> -----Original Message-----
> >>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> >>>> Behalf Of Eran Hammer-Lahav
> >>>> Sent: Wednesday, January 13, 2010 9:41 PM
> >>>> To: OAuth WG
> >>>> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
> >>>> Signing
> >>>>
> >>>> Authentication Open Question #1: What to sign?
> >>>>
> >>>> OAuth Core 1.0 was designed to sign API requests made using common
> >>>> form-encoded formats. The main component of the 1.0 signature base
> >>>> string are the parameters. The host and HTTP methods are important
> >>>> but were never the focus on the signed content.
> >>>>
> >>>> draft-hammer-oauth does not change the process but does describe
> >>>> the process very differently, changing the focus form signing API
> >>>> requests and parameters to signing HTTP requests (partially).
> >>>> draft-hammer-http-token-auth takes this approach a step further and
> >>>> focuses on signing the raw HTTP request components, completely
> >>>> ignoring their meaning as used by API calls. The end result is very
> >>>> similar but the differences are important.
> >>>>
> >>>> Brian Eaton proposed [1] an alternative approach to sign messages
> >>>> instead of API calls or HTTP request. In his proposal, the HTTP
> >>>> request (or API call based on your perspective) in transformed into
> >>>> a message (in his case using a JSON- based format) which is then
> >>>> signed. This additional layer of abstraction allows the use of the
> >>>> method with other transports or use cases in which parameters are
> >>>> not sent in the request URI or body.
> >>>>
> >>>> QUESTION: Do you prefer:
> >>>>
> >>>> A. Directly processing the HTTP request into a base string for
> >>>> signing (draft- hammer-oauth style).
> >>>> B. Treating the request as an API call with form-encoded parameters
> >>>> (OAuth
> >>>> 1.0 style).
> >>>> C. Converting the request into a normalized message and signing
> >>>> that (Eaton style).
> >>>>
> >>>> EHL
> >>>>
> >>>> [1] http://www.ietf.org/mail-archive/web/oauth/current/
> >>>> msg00890.html
> >>>>
> >>>> _______________________________________________
> >>>> OAuth mailing list
> >>>> OAuth@ietf.org
> >>>> https://www.ietf.org/mailman/listinfo/oauth
> >>> _______________________________________________
> >>> OAuth mailing list
> >>> OAuth@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/oauth
> >>


From rbarnes@bbn.com  Thu Jan 28 13:09:17 2010
Return-Path: <rbarnes@bbn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F2D0128C10A for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:09:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.524
X-Spam-Level: 
X-Spam-Status: No, score=-2.524 tagged_above=-999 required=5 tests=[AWL=0.075,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LQhcoV-n4Ryt for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:09:15 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by core3.amsl.com (Postfix) with ESMTP id D1E2F28C102 for <oauth@ietf.org>; Thu, 28 Jan 2010 13:09:14 -0800 (PST)
Received: from [192.1.255.186] (helo=col-dhcp-192-1-255-186.bbn.com) by smtp.bbn.com with esmtp (Exim 4.63) (envelope-from <rbarnes@bbn.com>) id 1NabcL-0004dl-BE; Thu, 28 Jan 2010 16:09:33 -0500
Message-Id: <2E1FBE9E-38C5-4A8C-A667-FDFF3DB14408@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D24A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Thu, 28 Jan 2010 16:09:32 -0500
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com> <3706407C-4381-43F9-AC66-4B9F64B21584@hueniverse.com> <B2406664-D322-4EDC-A032-7882EFBF214E@bbn.com> <90C41DD21FB7C64BB94121FBBC2E723437899D24A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
X-Mailer: Apple Mail (2.936)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 21:09:17 -0000

<sarcasm>We could always just use ASN.1</sarcasm>


On Jan 28, 2010, at 4:00 PM, Eran Hammer-Lahav wrote:

> That's exactly it.
>
> This is why JSON is not my top priority because people will see 'use  
> JSON' and ignore the profile (no whitespace) and will fail.
>
> Those of you who picked JSON, does this change your mind? If we use  
> JSON, I expect many existing libraries that produce JSON objects to  
> fail because of the differences in how they add whitespace.
>
> EHL
>
>> -----Original Message-----
>> From: Richard L. Barnes [mailto:rbarnes@bbn.com]
>> Sent: Thursday, January 28, 2010 11:32 AM
>> To: Eran Hammer-Lahav
>> Cc: OAuth WG
>> Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message
>> Signing
>>
>> Ah, ok, I misunderstood the context of your reference to XMPP.  So  
>> the
>> question at hand here is: How do you construct the thing you're  
>> going to
>> sign?
>>
>> Assuming that's the question, then the critical thing is that the  
>> format be
>> canonical (or at least canonicalizable).  That always seems easier  
>> for simpler
>> formats, so my inclination would be toward either form-encoding or a
>> custom format (3 or 4), since these define precise rules for how  
>> things fit
>> together.  After that, a tight profile of JSON might be workable  
>> (e.g., no
>> white space); XML is probably too much of a hassle.
>>
>> --Richard
>>
>>
>>
>> On Jan 28, 2010, at 1:06 PM, Eran Hammer-Lahav wrote:
>>
>>> This defeats the point of having a unified message format across
>>> different transports. And since the message itself is not sent on  
>>> the
>>> wire, the benefit to XMPP isn't that significant.
>>>
>>> Also, we are only talking about construction, not parsing. So
>>> technically, no lib is really needed in either case (but can be  
>>> useful
>>> for data type encoding).
>>>
>>> EHL
>>>
>>> On Jan 28, 2010, at 7:30, "Richard L. Barnes" <rbarnes@bbn.com>  
>>> wrote:
>>>
>>>> It's not clear that XML is always crazy.  If you're integrating  
>>>> this
>>>> into an XMPP client, it's already used to using XML (i.e., it's
>>>> already got a parser/generator), and might not have JSON machinery.
>>>>
>>>> I would suggest pinning down a data model that gets serialized to
>>>> different formats depending on the protocol.  You're going to  
>>>> have to
>>>> define how OAuth fits into a different protocol anyway, so if  
>>>> there's
>>>> a set of defined serializations, you can just add a line to that
>>>> definition that says "use X serialization".
>>>>
>>>> --Richard
>>>>
>>>>
>>>> On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:
>>>>
>>>>> I don't think we had enough discussion for a consensus call but I
>>>>> would like to continue with some combination of A and C. That  
>>>>> means,
>>>>> defining a message format to normalize the request into (which can
>>>>> be used with XMPP and other transports), but to still process the
>>>>> HTTP request and not the API request into the message. In other
>>>>> words, not process parameters but still turn the request into a
>>>>> message.
>>>>>
>>>>> I will try this in my next draft.
>>>>>
>>>>> My question: what format should we use for this message? The main
>>>>> four options are:
>>>>>
>>>>> 1. XML
>>>>> 2. JSON
>>>>> 3. Form-encoded (key=value&key=value) 4. Text (key-value pair new
>>>>> line separated, or HTTP-header like key="value" comma, etc.)
>>>>>
>>>>> My thinking is: XML is crazy here (complication without benefits),
>>>>> JSON is interesting but doesn't add much value beyond other  
>>>>> options
>>>>> (unless we foresee the need for lists or richer value types),  
>>>>> Form-
>>>>> encoded is ok but has to be specified due to variations in  
>>>>> libraries
>>>>> (well-known OAuth issue), and Text is easy but requires a custom
>>>>> parser and we need to choose a style.
>>>>>
>>>>> I am inclined to use Text (key=value LF) but can be talked into
>>>>> Form-
>>>>> encoded or even JSON.
>>>>>
>>>>> Anyone else?
>>>>>
>>>>> EHL
>>>>>
>>>>>> -----Original Message-----
>>>>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
>>>>>> Behalf Of Eran Hammer-Lahav
>>>>>> Sent: Wednesday, January 13, 2010 9:41 PM
>>>>>> To: OAuth WG
>>>>>> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
>>>>>> Signing
>>>>>>
>>>>>> Authentication Open Question #1: What to sign?
>>>>>>
>>>>>> OAuth Core 1.0 was designed to sign API requests made using  
>>>>>> common
>>>>>> form-encoded formats. The main component of the 1.0 signature  
>>>>>> base
>>>>>> string are the parameters. The host and HTTP methods are  
>>>>>> important
>>>>>> but were never the focus on the signed content.
>>>>>>
>>>>>> draft-hammer-oauth does not change the process but does describe
>>>>>> the process very differently, changing the focus form signing API
>>>>>> requests and parameters to signing HTTP requests (partially).
>>>>>> draft-hammer-http-token-auth takes this approach a step further  
>>>>>> and
>>>>>> focuses on signing the raw HTTP request components, completely
>>>>>> ignoring their meaning as used by API calls. The end result is  
>>>>>> very
>>>>>> similar but the differences are important.
>>>>>>
>>>>>> Brian Eaton proposed [1] an alternative approach to sign messages
>>>>>> instead of API calls or HTTP request. In his proposal, the HTTP
>>>>>> request (or API call based on your perspective) in transformed  
>>>>>> into
>>>>>> a message (in his case using a JSON- based format) which is then
>>>>>> signed. This additional layer of abstraction allows the use of  
>>>>>> the
>>>>>> method with other transports or use cases in which parameters are
>>>>>> not sent in the request URI or body.
>>>>>>
>>>>>> QUESTION: Do you prefer:
>>>>>>
>>>>>> A. Directly processing the HTTP request into a base string for
>>>>>> signing (draft- hammer-oauth style).
>>>>>> B. Treating the request as an API call with form-encoded  
>>>>>> parameters
>>>>>> (OAuth
>>>>>> 1.0 style).
>>>>>> C. Converting the request into a normalized message and signing
>>>>>> that (Eaton style).
>>>>>>
>>>>>> EHL
>>>>>>
>>>>>> [1] http://www.ietf.org/mail-archive/web/oauth/current/
>>>>>> msg00890.html
>>>>>>
>>>>>> _______________________________________________
>>>>>> OAuth mailing list
>>>>>> OAuth@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>> _______________________________________________
>>>>> OAuth mailing list
>>>>> OAuth@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/oauth
>>>>
>


From eran@hueniverse.com  Thu Jan 28 13:12:25 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A43A83A67FD for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:12:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.373
X-Spam-Level: 
X-Spam-Status: No, score=-2.373 tagged_above=-999 required=5 tests=[AWL=0.226,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RaSgIMjHlP9I for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:12:23 -0800 (PST)
Received: from p3plex1out02.prod.phx3.secureserver.net (p3plex1out02.prod.phx3.secureserver.net [72.167.180.18]) by core3.amsl.com (Postfix) with SMTP id 9AFED28C0FE for <oauth@ietf.org>; Thu, 28 Jan 2010 13:12:22 -0800 (PST)
Received: (qmail 21442 invoked from network); 28 Jan 2010 21:12:41 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.19) by p3plex1out02.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 21:12:41 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT001.EX1.SECURESERVER.NET ([72.167.180.19]) with mapi; Thu, 28 Jan 2010 14:12:43 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Richard L. Barnes" <rbarnes@bbn.com>
Date: Thu, 28 Jan 2010 14:12:34 -0700
Thread-Topic: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
Thread-Index: AcqgKgq6P1oKAZEzR/KiRn+ZmgjrgQAMxeLQ
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D24AD@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET> <F61645D1-7578-419D-A1E8-970BB137D64E@bbn.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22DA@P3PW5EX1MB01.EX1.SECURESERVER.NET> <EA0D5A88-DA31-4404-BED7-0F6EECF60A8D@bbn.com>
In-Reply-To: <EA0D5A88-DA31-4404-BED7-0F6EECF60A8D@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 21:12:26 -0000

> -----Original Message-----
> From: Richard L. Barnes [mailto:rbarnes@bbn.com]
> Sent: Thursday, January 28, 2010 6:56 AM
=20
> So you're assuming that somewhere in the process of token issuance, the
> client gets told what algorithm to use and remembers it.

Yep.

> When is this assumption true?  I don't see where it happens in the OAuth
> delegation procedure (there's no "use this algorithm" field in responses =
that
> issue tokens/secrets).

In 1.0 it's implied. The signature method is "delivered" via the API docume=
ntation. Since 1.0 includes a single HMAC method and a single RSA, and they=
 each use very different secrets, the token you get is already bound to an =
algorithm (and you know it ahead of time).

As soon as we allow (and we have wide consensus that we will) more than one=
 algorithm per family (HMAC, RSA, etc.), we need spell out which algorithm =
the token was created to work with. While the same secret can be used for b=
oth HMAC-SHA1 and HMAC-SHA256, this is not always true and it is better to =
explicitly bind the token secret (or other properties) to the cryptography =
used with it.

> And if Token auth is being used as a general
> authentication mechanism, the token secret might just be something like a
> password, which the user remembers, not the UA, so the UA would need to
> be informed somehow (by the user or the server) of what signing algorithm
> to apply.

We still don't know what this means. The previous discussion about this sho=
wed that using the token method to send human passwords is not going to imp=
rove much over Basic, other than requiring SSL. But either way, if we figur=
e out how to use a human password to make an authenticated request, we will=
 define a profile for it that will come with an implied token algorithm.

EHL

From eran@hueniverse.com  Thu Jan 28 13:41:55 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 489953A6844 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:41:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[AWL=-0.100, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i8Q15J6hyIRG for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 13:41:43 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 4BFE23A677C for <oauth@ietf.org>; Thu, 28 Jan 2010 13:41:43 -0800 (PST)
Received: (qmail 7806 invoked from network); 28 Jan 2010 21:42:02 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 21:42:02 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 28 Jan 2010 14:41:57 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Luke Shepard <lshepard@facebook.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 28 Jan 2010 14:41:53 -0700
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgLrPcaO2rzz8E5kqUBQr+cLgtywAMADew
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C786ED62.1C7AF%lshepard@facebook.com>
In-Reply-To: <C786ED62.1C7AF%lshepard@facebook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723437899D24CFP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth	communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 21:41:55 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D24CFP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Thanks Luke. This is a useful analysis.

I believe we have already reached consensus in this regard:

* Support an extensible set of signature algorithms
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)

(if these assumptions are incorrect, raise your hand now)

The specification is going to define the four methods above (and possibly m=
ore) as *must implement*. This does not mean vendors have to support all of=
 them, but that any *client* library or application claiming to be 'OAuth 2=
.0 compliant' must implement all these methods.

If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
'OAuth 2.0 compliant' because any it can interop with *any* compliant libra=
ry. However, if such a vendor produces a client library for its developers =
which only implements the methods deployed by the vendor, that library is '=
OAuth 2.0 partially compliant' (because it will not interop with *all* vend=
ors).

In practice, from Facebook's perspective, you will be able to deploy OAuth =
2.0 in a compliant way, while only implementing the methods that you find s=
uitable for your developers. It sounds like you will be using the plain met=
hod over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually =
makes things trivial for its developers, I expect Facebook to produce libra=
ries that will implement these two methods, but not others. This will be a =
'Facebook API' library that uses OAuth 2.0. It will be partially compliant =
but this only means it is only guaranteed to work with Facebook, but that i=
t does so in a fully compliant way.

EHL




From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of L=
uke Shepard
Sent: Thursday, January 28, 2010 7:30 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth commun=
ication

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D24CFP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><title>Discussion of SSL as the primary mean=
s for OAuth communication</title><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:Consolas;
	panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
pre
	{mso-style-priority:99;
	mso-style-link:"HTML Preformatted Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:10.0pt;
	font-family:Consolas;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.HTMLPreformattedChar
	{mso-style-name:"HTML Preformatted Char";
	mso-style-priority:99;
	mso-style-link:"HTML Preformatted";
	font-family:Consolas;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1641378660;
	mso-list-type:hybrid;
	mso-list-template-ids:1309684222 67698703 67698713 67698715 67698703 67698=
713 67698715 67698703 67698713 67698715;}
@list l0:level1
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Thanks Lu=
ke. This is a useful analysis.<o:p></o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F4=
97D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-s=
ize:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>I believe we h=
ave already reached consensus in this regard:<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>* Support an extensible set of signature algorithms<o:p></o:p></span></p><=
p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","=
sans-serif";color:#1F497D'>* Define hmac-sha-1, hmac-sha-256, and rsassa-pk=
cs1-v1.5-sha-256<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>* Define =
a plain method for bearer tokens and either require SSL/TLS or strongly rec=
ommend it (open issue)<o:p></o:p></span></p><p class=3DMsoNormal><span styl=
e=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:=
p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif";color:#1F497D'>(if these assumptions =
are incorrect, raise your hand now)<o:p></o:p></span></p><p class=3DMsoNorm=
al><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color=
:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The speci=
fication is going to define the four methods above (and possibly more) as *=
<b>must implement</b>*. This does not mean vendors have to support all of t=
hem, but that any *<b>client</b>* library or application claiming to be &#8=
216;OAuth 2.0 compliant&#8217; must implement all these methods.<o:p></o:p>=
</span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>If a vendor issues tokens not using all these methods (=
which is more likely), it does not have to implement all these methods and =
can still be called &#8216;OAuth 2.0 compliant&#8217; because any it can in=
terop with *<b>any</b>* compliant library. However, if such a vendor produc=
es a client library for its developers which only implements the methods de=
ployed by the vendor, that library is &#8216;OAuth 2.0 partially compliant&=
#8217; (because it will not interop with *<b>all</b>* vendors).<o:p></o:p><=
/span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:=
"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>In practice, from Facebook&#8217;s perspective, you wil=
l be able to deploy OAuth 2.0 in a compliant way, while only implementing t=
he methods that you find suitable for your developers. It sounds like you w=
ill be using the plain method over SSL and either hmac-sha-1 or hmac-sha-25=
6. Since Facebook usually makes things trivial for its developers, I expect=
 Facebook to produce libraries that will implement these two methods, but n=
ot others. This will be a &#8216;Facebook API&#8217; library that uses OAut=
h 2.0. It will be partially compliant but this only means it is only guaran=
teed to work with Facebook, but that it does so in a fully compliant way.<o=
:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;fo=
nt-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p=
><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri"=
,"sans-serif";color:#1F497D'>EHL<o:p></o:p></span></p><p class=3DMsoNormal>=
<span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1=
F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font=
-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;<=
/o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-f=
amily:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sa=
ns-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style=3D'border:n=
one;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><div><div style=
=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><=
p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma"=
,"sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;font-family:=
"Tahoma","sans-serif"'> oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.o=
rg] <b>On Behalf Of </b>Luke Shepard<br><b>Sent:</b> Thursday, January 28, =
2010 7:30 AM<br><b>To:</b> oauth@ietf.org<br><b>Subject:</b> [OAUTH-WG] Dis=
cussion of SSL as the primary means for OAuth communication<o:p></o:p></spa=
n></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoN=
ormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>I=
n the discussions around the OAuth WRAP spec, one of the questions often as=
ked is, &#8220;why use SSL exclusively?&#8221; Several of us have done a lo=
t of thinking on it and I wanted to articulate my understanding of the pros=
 and cons of the approach for discussion. The use case I primarily have in =
mind is that of a web service, like Facebook, Twitter, or Google services. =
Our service is primarily authenticated via the Web, but we have a use for a=
ll of the WRAP profiles (web app, client app, desktop, mobile).<br>&nbsp;<b=
r>Overall, I think that the simplicity of using SSL outweighs all the assoc=
iated costs for most developers. However, we should offer plaintext signatu=
res as an optional performance enhancement for advanced developers.<br><br>=
=3D=3D Advantages of using SSL for API calls<br><br>-- It&#8217;s overwhelm=
ingly simpler for developers.<br>I&#8217;ve implemented OpenID and OAuth, a=
nd I&#8217;ve worked for years with developers trying to handle signatures =
on the Facebook Platform. In my experience, calculating signatures is one o=
f the most complex and difficult parts of an authentication protocol, and d=
evelopers often get it wrong. By moving that piece down the stack we can ge=
t it out of their way and let developers focus on building their apps.<br><=
br>-- Existing tools ecosystem<br>It&#8217;s not that SSL is a simpler encr=
yption protocol than OAuth (it&#8217;s not) but rather that commonly availa=
ble tools almost universally support it &#8211; every major web browser, as=
 well as most libraries for making HTTP requests (like curl) have built-in =
support for SSL. For OAuth 1.0, you need to use a client library just to co=
nstruct your very first request.<br><br>-- Smaller client libraries<br>A go=
od chunk of code in many client libraries is devoted to calculating and ver=
ifying signatures. For example, the OpenID PHP library imports several BigM=
ath modules and encryption schemes. Even the relatively simpler Facebook cl=
ient library requires several functions to sign requests. This makes the cl=
ient libraries a black box and impedes understanding. <br><br>Wouldn&#8217;=
t it be great if we could write a protocol that doesn&#8217;t even require =
a client library to implement? If I could just make an authenticated API re=
quest in my browser, as easily as with Basic Auth?<br><br>=3D=3D Disadvanta=
ges of using SSL for API calls<br><br>-- Difficulties of debugging<br><br>B=
oth signatures and SSL present difficulties in debugging, but they tend to =
be different. While with signatures you worry about composing the arguments=
 wrong or using the wrong algorithm, with SSL you worry about reading the r=
equest over the wire. You can&#8217;t sniff a request, and to intercept it,=
 you need an HTTP proxy that understands SSL, and you need to worry about i=
nvalid certificate errors. To aid in this, providers will probably offer a =
non-SSL endpoint for debugging, but they may need to set up a sandbox envir=
onment to prevent damage from tokens exposed in plaintext.<br><br>-- Variab=
le costs for providers<br><br>Server CPU costs will increase when handling =
SSL requests &#8211; especially on every API call instead of just at the au=
th stage. At scale, this can become expensive, although it can be offset by=
 using specialized hardware to terminate the SSL connection. All the big co=
mpanies I&#8217;ve talked to are comfortable trading these higher costs for=
 increased adoption due to the simplicity.<br><br>-- Fixed costs for smalle=
r providers<br><br>There is a fixed cost to obtaining and signing an SSL ce=
rtificates, although that has dropped in recent years such that an operator=
 can have a cert signed for a single domain for pretty cheap.<br><br>-- Lat=
ency<br><br>SSL connections take more time to establish than normal HTTP co=
nnections. Servers can use specialized hardware to speed it up, but clients=
 rarely do, which means that for client-to-server API requests, there may b=
e some higher latency in each request. Smaller, mobile devices may be dispr=
oportionately affected by this, but as they grow more powerful it&#8217;s l=
ess of a concern. Already today newer phones can handle SSL just fine.<br><=
br>-- Browser limitations for cross domain communication<br><br>A more nich=
e disadvantage is that some cross domain communication techniques require t=
he protocol of the parent page to match that of the endpoint being queried.=
 So for example, in some browsers, for some API calls, it would be impossib=
le to make an API call to an HTTPS endpoint from a normal HTTP page. Howeve=
r, as browsers advance and HTML5 methods like postMessage become more commo=
n, this will become less of an issue.<br><br>-- Verifying information on th=
e relying party<br><br>If information is passed from a Service Provider to =
a Consumer through the user&#8217;s browser, then that information cannot b=
e verified without an API call, unless a signature is provided. Similar to =
stateful vs. stateless mode in the OpenID 2.0 spec, the signature can serve=
 as a performance enhancement to avoid an API call.<br><br>=3D=3D Providing=
 a non-SSL option for the short head<br><br>Most platforms tend to have a s=
mall number of fairly large developers and then a really large number of sm=
aller developers. The former are typically experienced (or at least, they a=
re by the time they get big) and have made a large investment in the platfo=
rm. The latter range from experienced developers to amateurs to folks that =
would not typically program. For this spec to be successful, it must meet t=
he needs of both groups.<br><br>Facebook is very interested in adopting OAu=
th WRAP / 2.0 / whatever because we want to help our long tail developers u=
se our platform more easily. For the long tail, the simplicity provided by =
SSL will be crucial. It means smaller or nonexistent client libaries, it me=
ans that developers can just try out the API by typing it into a web browse=
r, and it will help reduce debugging and maintenance costs.<br><br>However,=
 for the short head of high volume developers, we probably want an option t=
o use something other than SSL to make secure requests. These developers te=
nd to have already solved the low hanging performance fruit, and for them i=
t may be a significant penalty to pay the SSL connection cost on every requ=
est. To that end, I think it&#8217;s pretty important that OAuth 2.0 suppor=
t a method other than SSL as an option for advanced developers. But it shou=
ld be just that &#8211; an option, and only for advanced developers, so tha=
t beginning programmers and folks learning an API don&#8217;t need to worry=
 about signatures when they just want to play around.<br><br>Please let me =
know if I&#8217;m missing something or if my assumptions sound incorrect.<b=
r><br>-Luke Shepard<br>Software Engineer, Facebook Platform</span><o:p></o:=
p></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D24CFP3PW5EX1MB01E_--

From GFFletch@aol.com  Thu Jan 28 14:01:10 2010
Return-Path: <GFFletch@aol.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 8C0073A69A6 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 14:01:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, J_CHICKENPOX_53=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BN4dAHQNMW2g for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 14:01:09 -0800 (PST)
Received: from imr-ma01.mx.aol.com (imr-ma01.mx.aol.com [64.12.206.39]) by core3.amsl.com (Postfix) with ESMTP id 67B103A6842 for <oauth@ietf.org>; Thu, 28 Jan 2010 14:01:09 -0800 (PST)
Received: from imo-ma03.mx.aol.com (imo-ma03.mx.aol.com [64.12.78.138]) by imr-ma01.mx.aol.com (8.14.1/8.14.1) with ESMTP id o0SM1Kfl010596; Thu, 28 Jan 2010 17:01:21 -0500
Received: from GFFletch@aol.com by imo-ma03.mx.aol.com  (mail_out_v42.9.) id 2.cf0.715c4cec (37230); Thu, 28 Jan 2010 17:01:17 -0500 (EST)
Received: from palantir.local ([10.172.2.122]) by cia-ma06.mx.aol.com (v127.7) with ESMTP id MAILCIAMA067-916e4b620926133; Thu, 28 Jan 2010 17:01:16 -0500
Message-ID: <4B620926.2060605@aol.com>
Date: Thu, 28 Jan 2010 17:01:10 -0500
From: George Fletcher <gffletch@aol.com>
Organization: AOL LLC
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: "Paul C. Bryan" <email@pbryan.net>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D22BC@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1264653860.4804.8.camel@localhost>
In-Reply-To: <1264653860.4804.8.camel@localhost>
Content-Type: multipart/alternative; boundary="------------090404010003020504020103"
X-AOL-IP: 10.172.2.122
X-Mailer: Unknown (No Version)
X-AOL-SENDER: GFFletch@aol.com
Cc: "OAuth WG \(oauth@ietf.org\)" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] What are the primary criteria in issuing an authentication challenge?
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 22:01:10 -0000

--------------090404010003020504020103
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

That definitely seems like a viable option.

Thanks,
George

On 1/27/10 11:44 PM, Paul C. Bryan wrote:
> I'm in the #1 camp too. Is it wrong for me to think that discovering
> what type(s) of token are acceptable and how to obtain them should be
> the domain of XRD?
>
> Paul
>
> On Wed, 2010-01-27 at 20:11 -0700, Eran Hammer-Lahav wrote:
>    
>> An authentication challenge (to make sure we are all on the same page) is something the server sends to the client when denying access to a protected resource. The challenge can be as simple as "use Basic", or complex as "use Digest with the following parameters". OAuth 1.0 doesn't really use a challenge because it was created for cases where the API calls are preconfigured and hardcoded into the client. The client should never receive an OAuth challenge the way the protocol was originally designed.
>>
>> In my token authentication draft I tried to propose multiple mechanisms (not fully baked yet) for issuing a challenge and allowing the client to figure out what to do next. Before producing another draft, it is important to figure out what challenge model we want to use. Here are the general options I came up with:
>>
>> 1. Basic / OAuth 1.0 style - Simply say "use Token". The client is left on its own to figure out what to do next.
>>
>> 2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you need a new token go there". It is still not clear how this will help the client given that getting a token is likely it include many different options, and to fully address this we need to dig deep into discovery which was left out of scope.
>>
>> 3. Token attributes - the server informs the client of the kind of tokens accepted (based on their cryptographic properties or the resource-set/realm they are good for). This is just like #2 but with the ability for the server to support more than one token type per resource.
>>
>> Question: Is the ability for a single token-protected resource to support more than one token type (say Plain+SSL *and* HMAC-256) part of our requirements? If not, there is no reason at all for the challenge to include anything other than #1 or #2 (probably defined as a future extension).
>>
>> EHL
>>
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
>>      
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>    

--------------090404010003020504020103
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
  <meta content="text/html; charset=ISO-8859-1"   http-equiv="Content-Type">
  <title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
<font face="Helvetica, Arial, sans-serif">That definitely seems like a
viable option.<br>
<br>
Thanks,<br>
George<br>
</font><br>
On 1/27/10 11:44 PM, Paul C. Bryan wrote:
<blockquote cite="mid:1264653860.4804.8.camel@localhost" type="cite">
  <pre wrap="">I'm in the #1 camp too. Is it wrong for me to think that discovering
what type(s) of token are acceptable and how to obtain them should be
the domain of XRD?

Paul

On Wed, 2010-01-27 at 20:11 -0700, Eran Hammer-Lahav wrote:
  </pre>
  <blockquote type="cite">
    <pre wrap="">An authentication challenge (to make sure we are all on the same page) is something the server sends to the client when denying access to a protected resource. The challenge can be as simple as "use Basic", or complex as "use Digest with the following parameters". OAuth 1.0 doesn't really use a challenge because it was created for cases where the API calls are preconfigured and hardcoded into the client. The client should never receive an OAuth challenge the way the protocol was originally designed.

In my token authentication draft I tried to propose multiple mechanisms (not fully baked yet) for issuing a challenge and allowing the client to figure out what to do next. Before producing another draft, it is important to figure out what challenge model we want to use. Here are the general options I came up with:

1. Basic / OAuth 1.0 style - Simply say "use Token". The client is left on its own to figure out what to do next.

2. Basic / OAuth 1.0 + simple discovery - Say "use Token and if you need a new token go there". It is still not clear how this will help the client given that getting a token is likely it include many different options, and to fully address this we need to dig deep into discovery which was left out of scope.

3. Token attributes - the server informs the client of the kind of tokens accepted (based on their cryptographic properties or the resource-set/realm they are good for). This is just like #2 but with the ability for the server to support more than one token type per resource.

Question: Is the ability for a single token-protected resource to support more than one token type (say Plain+SSL *and* HMAC-256) part of our requirements? If not, there is no reason at all for the challenge to include anything other than #1 or #2 (probably defined as a future extension).

EHL

_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>
    </pre>
  </blockquote>
  <pre wrap="">

_______________________________________________
OAuth mailing list
<a class="moz-txt-link-abbreviated" href="mailto:OAuth@ietf.org">OAuth@ietf.org</a>
<a class="moz-txt-link-freetext" href="https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.org/mailman/listinfo/oauth</a>

  </pre>
</blockquote>
</body>
</html>

--------------090404010003020504020103--

From onyxraven@gmail.com  Thu Jan 28 15:00:22 2010
Return-Path: <onyxraven@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id CDA853A6915 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:00:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uqSpEFJ2BPDU for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:00:21 -0800 (PST)
Received: from mail-gx0-f228.google.com (mail-gx0-f228.google.com [209.85.217.228]) by core3.amsl.com (Postfix) with ESMTP id 0A63B3A691D for <oauth@ietf.org>; Thu, 28 Jan 2010 15:00:20 -0800 (PST)
Received: by gxk28 with SMTP id 28so1116740gxk.9 for <oauth@ietf.org>; Thu, 28 Jan 2010 15:00:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :from:date:message-id:subject:to:cc:content-type; bh=4hTCNn8xhzVq8fa6DCApkk4oEKpKZqjros41WtqHaCQ=; b=v+uEVu5texc5VP8IIAAewKTPO56HZOiRcIQYhqH6lbJSmSS6zbTv4kYmZWIPEkAqOa oWcqY2iE/j9D4JaC5apSmoAMMQ/gfFICwIUDnDCORnFDlDAFfP1ff1/12ebvQ/WQ+XMV LtAnmRPaj9J6EmvNExMBZlm7KXqSL6XwgBnYQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=l4ckG1toU8cUZJ4L/fadmPs1F6GxB7WdJ+VwWR4l3s6XZ0NQKsHzj4AYblFKss3wLP /OGwcN4f0BqITq6HLHa8zEJ8Ae7aCgt1/g+ZPhNsuHXC/usDrgN5ViXILZHsiQcrZS7k l9MGjhpkToU/uLEAGBKMswUzoWjf2uOzzkE6M=
MIME-Version: 1.0
Received: by 10.150.48.23 with SMTP id v23mr585929ybv.184.1264719637271; Thu,  28 Jan 2010 15:00:37 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D24A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <BBC899EE-08D9-4662-A3DD-4D5E8FBBD9CE@bbn.com> <3706407C-4381-43F9-AC66-4B9F64B21584@hueniverse.com>  <B2406664-D322-4EDC-A032-7882EFBF214E@bbn.com> <90C41DD21FB7C64BB94121FBBC2E723437899D24A9@P3PW5EX1MB01.EX1.SECURESERVER.NET>
From: Justin Hart <onyxraven@gmail.com>
Date: Thu, 28 Jan 2010 16:00:17 -0700
Message-ID: <c5eeec031001281500q4503e311y6507e10bbdcbebcd@mail.gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=000e0cd598a6b855c3047e417cb2
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 23:00:22 -0000

--000e0cd598a6b855c3047e417cb2
Content-Type: text/plain; charset=ISO-8859-1

You're correct.  I was thinking too much about reading, not about creating.
 This is all about creation.  In that case, the absolute simpler the better.
 In any case there'll have to be some key-value and pair delimiter which
will need to be escaped within keys and values.  The newline idea (where
newlines become literal \n?) is nice, because it has implied key-value
delimiter by specifying that values always come after keys delimited by
newline.  Then we only have one thing to escape.

On Thu, Jan 28, 2010 at 2:00 PM, Eran Hammer-Lahav <eran@hueniverse.com>wrote:

> That's exactly it.
>
> This is why JSON is not my top priority because people will see 'use JSON'
> and ignore the profile (no whitespace) and will fail.
>
> Those of you who picked JSON, does this change your mind? If we use JSON, I
> expect many existing libraries that produce JSON objects to fail because of
> the differences in how they add whitespace.
>
> EHL
>
> > -----Original Message-----
> > From: Richard L. Barnes [mailto:rbarnes@bbn.com]
> > Sent: Thursday, January 28, 2010 11:32 AM
> > To: Eran Hammer-Lahav
> > Cc: OAuth WG
> > Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message
> > Signing
> >
> > Ah, ok, I misunderstood the context of your reference to XMPP.  So the
> > question at hand here is: How do you construct the thing you're going to
> > sign?
> >
> > Assuming that's the question, then the critical thing is that the format
> be
> > canonical (or at least canonicalizable).  That always seems easier for
> simpler
> > formats, so my inclination would be toward either form-encoding or a
> > custom format (3 or 4), since these define precise rules for how things
> fit
> > together.  After that, a tight profile of JSON might be workable (e.g.,
> no
> > white space); XML is probably too much of a hassle.
> >
> > --Richard
> >
> >
> >
> > On Jan 28, 2010, at 1:06 PM, Eran Hammer-Lahav wrote:
> >
> > > This defeats the point of having a unified message format across
> > > different transports. And since the message itself is not sent on the
> > > wire, the benefit to XMPP isn't that significant.
> > >
> > > Also, we are only talking about construction, not parsing. So
> > > technically, no lib is really needed in either case (but can be useful
> > > for data type encoding).
> > >
> > > EHL
> > >
> > > On Jan 28, 2010, at 7:30, "Richard L. Barnes" <rbarnes@bbn.com> wrote:
> > >
> > >> It's not clear that XML is always crazy.  If you're integrating this
> > >> into an XMPP client, it's already used to using XML (i.e., it's
> > >> already got a parser/generator), and might not have JSON machinery.
> > >>
> > >> I would suggest pinning down a data model that gets serialized to
> > >> different formats depending on the protocol.  You're going to have to
> > >> define how OAuth fits into a different protocol anyway, so if there's
> > >> a set of defined serializations, you can just add a line to that
> > >> definition that says "use X serialization".
> > >>
> > >> --Richard
> > >>
> > >>
> > >> On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:
> > >>
> > >>> I don't think we had enough discussion for a consensus call but I
> > >>> would like to continue with some combination of A and C. That means,
> > >>> defining a message format to normalize the request into (which can
> > >>> be used with XMPP and other transports), but to still process the
> > >>> HTTP request and not the API request into the message. In other
> > >>> words, not process parameters but still turn the request into a
> > >>> message.
> > >>>
> > >>> I will try this in my next draft.
> > >>>
> > >>> My question: what format should we use for this message? The main
> > >>> four options are:
> > >>>
> > >>> 1. XML
> > >>> 2. JSON
> > >>> 3. Form-encoded (key=value&key=value) 4. Text (key-value pair new
> > >>> line separated, or HTTP-header like key="value" comma, etc.)
> > >>>
> > >>> My thinking is: XML is crazy here (complication without benefits),
> > >>> JSON is interesting but doesn't add much value beyond other options
> > >>> (unless we foresee the need for lists or richer value types), Form-
> > >>> encoded is ok but has to be specified due to variations in libraries
> > >>> (well-known OAuth issue), and Text is easy but requires a custom
> > >>> parser and we need to choose a style.
> > >>>
> > >>> I am inclined to use Text (key=value LF) but can be talked into
> > >>> Form-
> > >>> encoded or even JSON.
> > >>>
> > >>> Anyone else?
> > >>>
> > >>> EHL
> > >>>
> > >>>> -----Original Message-----
> > >>>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> > >>>> Behalf Of Eran Hammer-Lahav
> > >>>> Sent: Wednesday, January 13, 2010 9:41 PM
> > >>>> To: OAuth WG
> > >>>> Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
> > >>>> Signing
> > >>>>
> > >>>> Authentication Open Question #1: What to sign?
> > >>>>
> > >>>> OAuth Core 1.0 was designed to sign API requests made using common
> > >>>> form-encoded formats. The main component of the 1.0 signature base
> > >>>> string are the parameters. The host and HTTP methods are important
> > >>>> but were never the focus on the signed content.
> > >>>>
> > >>>> draft-hammer-oauth does not change the process but does describe
> > >>>> the process very differently, changing the focus form signing API
> > >>>> requests and parameters to signing HTTP requests (partially).
> > >>>> draft-hammer-http-token-auth takes this approach a step further and
> > >>>> focuses on signing the raw HTTP request components, completely
> > >>>> ignoring their meaning as used by API calls. The end result is very
> > >>>> similar but the differences are important.
> > >>>>
> > >>>> Brian Eaton proposed [1] an alternative approach to sign messages
> > >>>> instead of API calls or HTTP request. In his proposal, the HTTP
> > >>>> request (or API call based on your perspective) in transformed into
> > >>>> a message (in his case using a JSON- based format) which is then
> > >>>> signed. This additional layer of abstraction allows the use of the
> > >>>> method with other transports or use cases in which parameters are
> > >>>> not sent in the request URI or body.
> > >>>>
> > >>>> QUESTION: Do you prefer:
> > >>>>
> > >>>> A. Directly processing the HTTP request into a base string for
> > >>>> signing (draft- hammer-oauth style).
> > >>>> B. Treating the request as an API call with form-encoded parameters
> > >>>> (OAuth
> > >>>> 1.0 style).
> > >>>> C. Converting the request into a normalized message and signing
> > >>>> that (Eaton style).
> > >>>>
> > >>>> EHL
> > >>>>
> > >>>> [1] http://www.ietf.org/mail-archive/web/oauth/current/
> > >>>> msg00890.html
> > >>>>
> > >>>> _______________________________________________
> > >>>> OAuth mailing list
> > >>>> OAuth@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/oauth
> > >>> _______________________________________________
> > >>> OAuth mailing list
> > >>> OAuth@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/oauth
> > >>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>

--000e0cd598a6b855c3047e417cb2
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

You&#39;re correct. =A0I was thinking too much about reading, not about cre=
ating. =A0This is all about creation. =A0In that case, the absolute simpler=
 the better. =A0In any case there&#39;ll have to be some key-value and pair=
 delimiter which will need to be escaped within keys and values. =A0The new=
line idea (where newlines become literal \n?) is nice, because it has impli=
ed key-value delimiter by specifying that values always come after keys del=
imited by newline. =A0Then we only have one thing to escape.<br>

<br><div class=3D"gmail_quote">On Thu, Jan 28, 2010 at 2:00 PM, Eran Hammer=
-Lahav <span dir=3D"ltr">&lt;<a href=3D"mailto:eran@hueniverse.com">eran@hu=
eniverse.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">

That&#39;s exactly it.<br>
<br>
This is why JSON is not my top priority because people will see &#39;use JS=
ON&#39; and ignore the profile (no whitespace) and will fail.<br>
<br>
Those of you who picked JSON, does this change your mind? If we use JSON, I=
 expect many existing libraries that produce JSON objects to fail because o=
f the differences in how they add whitespace.<br>
<font color=3D"#888888"><br>
EHL<br>
</font><div class=3D"im"><br>
&gt; -----Original Message-----<br>
&gt; From: Richard L. Barnes [mailto:<a href=3D"mailto:rbarnes@bbn.com">rba=
rnes@bbn.com</a>]<br>
</div><div><div></div><div class=3D"h5">&gt; Sent: Thursday, January 28, 20=
10 11:32 AM<br>
&gt; To: Eran Hammer-Lahav<br>
&gt; Cc: OAuth WG<br>
&gt; Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message<br=
>
&gt; Signing<br>
&gt;<br>
&gt; Ah, ok, I misunderstood the context of your reference to XMPP. =A0So t=
he<br>
&gt; question at hand here is: How do you construct the thing you&#39;re go=
ing to<br>
&gt; sign?<br>
&gt;<br>
&gt; Assuming that&#39;s the question, then the critical thing is that the =
format be<br>
&gt; canonical (or at least canonicalizable). =A0That always seems easier f=
or simpler<br>
&gt; formats, so my inclination would be toward either form-encoding or a<b=
r>
&gt; custom format (3 or 4), since these define precise rules for how thing=
s fit<br>
&gt; together. =A0After that, a tight profile of JSON might be workable (e.=
g., no<br>
&gt; white space); XML is probably too much of a hassle.<br>
&gt;<br>
&gt; --Richard<br>
&gt;<br>
&gt;<br>
&gt;<br>
&gt; On Jan 28, 2010, at 1:06 PM, Eran Hammer-Lahav wrote:<br>
&gt;<br>
&gt; &gt; This defeats the point of having a unified message format across<=
br>
&gt; &gt; different transports. And since the message itself is not sent on=
 the<br>
&gt; &gt; wire, the benefit to XMPP isn&#39;t that significant.<br>
&gt; &gt;<br>
&gt; &gt; Also, we are only talking about construction, not parsing. So<br>
&gt; &gt; technically, no lib is really needed in either case (but can be u=
seful<br>
&gt; &gt; for data type encoding).<br>
&gt; &gt;<br>
&gt; &gt; EHL<br>
&gt; &gt;<br>
&gt; &gt; On Jan 28, 2010, at 7:30, &quot;Richard L. Barnes&quot; &lt;<a hr=
ef=3D"mailto:rbarnes@bbn.com">rbarnes@bbn.com</a>&gt; wrote:<br>
&gt; &gt;<br>
&gt; &gt;&gt; It&#39;s not clear that XML is always crazy. =A0If you&#39;re=
 integrating this<br>
&gt; &gt;&gt; into an XMPP client, it&#39;s already used to using XML (i.e.=
, it&#39;s<br>
&gt; &gt;&gt; already got a parser/generator), and might not have JSON mach=
inery.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; I would suggest pinning down a data model that gets serialize=
d to<br>
&gt; &gt;&gt; different formats depending on the protocol. =A0You&#39;re go=
ing to have to<br>
&gt; &gt;&gt; define how OAuth fits into a different protocol anyway, so if=
 there&#39;s<br>
&gt; &gt;&gt; a set of defined serializations, you can just add a line to t=
hat<br>
&gt; &gt;&gt; definition that says &quot;use X serialization&quot;.<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; --Richard<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt; On Jan 27, 2010, at 9:42 PM, Eran Hammer-Lahav wrote:<br>
&gt; &gt;&gt;<br>
&gt; &gt;&gt;&gt; I don&#39;t think we had enough discussion for a consensu=
s call but I<br>
&gt; &gt;&gt;&gt; would like to continue with some combination of A and C. =
That means,<br>
&gt; &gt;&gt;&gt; defining a message format to normalize the request into (=
which can<br>
&gt; &gt;&gt;&gt; be used with XMPP and other transports), but to still pro=
cess the<br>
&gt; &gt;&gt;&gt; HTTP request and not the API request into the message. In=
 other<br>
&gt; &gt;&gt;&gt; words, not process parameters but still turn the request =
into a<br>
&gt; &gt;&gt;&gt; message.<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; I will try this in my next draft.<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; My question: what format should we use for this message? =
The main<br>
&gt; &gt;&gt;&gt; four options are:<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; 1. XML<br>
&gt; &gt;&gt;&gt; 2. JSON<br>
&gt; &gt;&gt;&gt; 3. Form-encoded (key=3Dvalue&amp;key=3Dvalue) 4. Text (ke=
y-value pair new<br>
&gt; &gt;&gt;&gt; line separated, or HTTP-header like key=3D&quot;value&quo=
t; comma, etc.)<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; My thinking is: XML is crazy here (complication without b=
enefits),<br>
&gt; &gt;&gt;&gt; JSON is interesting but doesn&#39;t add much value beyond=
 other options<br>
&gt; &gt;&gt;&gt; (unless we foresee the need for lists or richer value typ=
es), Form-<br>
&gt; &gt;&gt;&gt; encoded is ok but has to be specified due to variations i=
n libraries<br>
&gt; &gt;&gt;&gt; (well-known OAuth issue), and Text is easy but requires a=
 custom<br>
&gt; &gt;&gt;&gt; parser and we need to choose a style.<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; I am inclined to use Text (key=3Dvalue LF) but can be tal=
ked into<br>
&gt; &gt;&gt;&gt; Form-<br>
&gt; &gt;&gt;&gt; encoded or even JSON.<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; Anyone else?<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt; EHL<br>
&gt; &gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; -----Original Message-----<br>
&gt; &gt;&gt;&gt;&gt; From: <a href=3D"mailto:oauth-bounces@ietf.org">oauth=
-bounces@ietf.org</a> [mailto:<a href=3D"mailto:oauth-bounces@ietf.org">oau=
th-bounces@ietf.org</a>] On<br>
&gt; &gt;&gt;&gt;&gt; Behalf Of Eran Hammer-Lahav<br>
&gt; &gt;&gt;&gt;&gt; Sent: Wednesday, January 13, 2010 9:41 PM<br>
&gt; &gt;&gt;&gt;&gt; To: OAuth WG<br>
&gt; &gt;&gt;&gt;&gt; Subject: [OAUTH-WG] Request Signing vs. API Signing v=
s. Message<br>
&gt; &gt;&gt;&gt;&gt; Signing<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; Authentication Open Question #1: What to sign?<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; OAuth Core 1.0 was designed to sign API requests made=
 using common<br>
&gt; &gt;&gt;&gt;&gt; form-encoded formats. The main component of the 1.0 s=
ignature base<br>
&gt; &gt;&gt;&gt;&gt; string are the parameters. The host and HTTP methods =
are important<br>
&gt; &gt;&gt;&gt;&gt; but were never the focus on the signed content.<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; draft-hammer-oauth does not change the process but do=
es describe<br>
&gt; &gt;&gt;&gt;&gt; the process very differently, changing the focus form=
 signing API<br>
&gt; &gt;&gt;&gt;&gt; requests and parameters to signing HTTP requests (par=
tially).<br>
&gt; &gt;&gt;&gt;&gt; draft-hammer-http-token-auth takes this approach a st=
ep further and<br>
&gt; &gt;&gt;&gt;&gt; focuses on signing the raw HTTP request components, c=
ompletely<br>
&gt; &gt;&gt;&gt;&gt; ignoring their meaning as used by API calls. The end =
result is very<br>
&gt; &gt;&gt;&gt;&gt; similar but the differences are important.<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; Brian Eaton proposed [1] an alternative approach to s=
ign messages<br>
&gt; &gt;&gt;&gt;&gt; instead of API calls or HTTP request. In his proposal=
, the HTTP<br>
&gt; &gt;&gt;&gt;&gt; request (or API call based on your perspective) in tr=
ansformed into<br>
&gt; &gt;&gt;&gt;&gt; a message (in his case using a JSON- based format) wh=
ich is then<br>
&gt; &gt;&gt;&gt;&gt; signed. This additional layer of abstraction allows t=
he use of the<br>
&gt; &gt;&gt;&gt;&gt; method with other transports or use cases in which pa=
rameters are<br>
&gt; &gt;&gt;&gt;&gt; not sent in the request URI or body.<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; QUESTION: Do you prefer:<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; A. Directly processing the HTTP request into a base s=
tring for<br>
&gt; &gt;&gt;&gt;&gt; signing (draft- hammer-oauth style).<br>
&gt; &gt;&gt;&gt;&gt; B. Treating the request as an API call with form-enco=
ded parameters<br>
&gt; &gt;&gt;&gt;&gt; (OAuth<br>
&gt; &gt;&gt;&gt;&gt; 1.0 style).<br>
&gt; &gt;&gt;&gt;&gt; C. Converting the request into a normalized message a=
nd signing<br>
&gt; &gt;&gt;&gt;&gt; that (Eaton style).<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; EHL<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; [1] <a href=3D"http://www.ietf.org/mail-archive/web/o=
auth/current/" target=3D"_blank">http://www.ietf.org/mail-archive/web/oauth=
/current/</a><br>
&gt; &gt;&gt;&gt;&gt; msg00890.html<br>
&gt; &gt;&gt;&gt;&gt;<br>
&gt; &gt;&gt;&gt;&gt; _______________________________________________<br>
&gt; &gt;&gt;&gt;&gt; OAuth mailing list<br>
&gt; &gt;&gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><=
br>
&gt; &gt;&gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oaut=
h" target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt; &gt;&gt;&gt; _______________________________________________<br>
&gt; &gt;&gt;&gt; OAuth mailing list<br>
&gt; &gt;&gt;&gt; <a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
&gt; &gt;&gt;&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/oauth" t=
arget=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a><br>
&gt; &gt;&gt;<br>
<br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
</div></div></blockquote></div><br>

--000e0cd598a6b855c3047e417cb2--

From email@pbryan.net  Thu Jan 28 15:11:26 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 171663A68BD for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:11:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=0.300,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nmAh4MY-hA2G for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:11:18 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id 24F9A3A697E for <oauth@ietf.org>; Thu, 28 Jan 2010 15:11:18 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id 88C81EA022 for <oauth@ietf.org>; Thu, 28 Jan 2010 23:11:36 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 28 Jan 2010 15:11:35 -0800
Message-ID: <1264720295.22963.13.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 23:11:27 -0000

+1 to JSON. Rationale:

1. Allows for structured data with relatively low overhead (unlike flat
name-value pairs).
2. Marshalls/unmarshalls nearly unambiguously to/from native data
structures (dictionaries, arrays, integers, strings, etc.) in multiple
programming languages (unlike XML).
3. In-browser capabilities (e.g. JavaScript) for manipulating
JSON-structured data.

That said, there would probably need to be some restrictions on JSON
encoding in order to support normalization. See
http://wiki.apache.org/couchdb/SignedDocuments for issues they've had to
deal with on this front.

Paul

On Wed, 2010-01-27 at 19:42 -0700, Eran Hammer-Lahav wrote:
> I don't think we had enough discussion for a consensus call but I would like to continue with some combination of A and C. That means, defining a message format to normalize the request into (which can be used with XMPP and other transports), but to still process the HTTP request and not the API request into the message. In other words, not process parameters but still turn the request into a message.
> 
> I will try this in my next draft.
> 
> My question: what format should we use for this message? The main four options are:
> 
> 1. XML
> 2. JSON
> 3. Form-encoded (key=value&key=value)
> 4. Text (key-value pair new line separated, or HTTP-header like key="value" comma, etc.)
> 
> My thinking is: XML is crazy here (complication without benefits), JSON is interesting but doesn't add much value beyond other options (unless we foresee the need for lists or richer value types), Form-encoded is ok but has to be specified due to variations in libraries (well-known OAuth issue), and Text is easy but requires a custom parser and we need to choose a style.
> 
> I am inclined to use Text (key=value LF) but can be talked into Form-encoded or even JSON.
> 
> Anyone else?
> 
> EHL
> 
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Eran Hammer-Lahav
> > Sent: Wednesday, January 13, 2010 9:41 PM
> > To: OAuth WG
> > Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
> > 
> > Authentication Open Question #1: What to sign?
> > 
> > OAuth Core 1.0 was designed to sign API requests made using common
> > form-encoded formats. The main component of the 1.0 signature base string
> > are the parameters. The host and HTTP methods are important but were
> > never the focus on the signed content.
> > 
> > draft-hammer-oauth does not change the process but does describe the
> > process very differently, changing the focus form signing API requests and
> > parameters to signing HTTP requests (partially).
> > draft-hammer-http-token-auth takes this approach a step further and
> > focuses on signing the raw HTTP request components, completely ignoring
> > their meaning as used by API calls. The end result is very similar but the
> > differences are important.
> > 
> > Brian Eaton proposed [1] an alternative approach to sign messages instead of
> > API calls or HTTP request. In his proposal, the HTTP request (or API call based
> > on your perspective) in transformed into a message (in his case using a JSON-
> > based format) which is then signed. This additional layer of abstraction allows
> > the use of the method with other transports or use cases in which
> > parameters are not sent in the request URI or body.
> > 
> > QUESTION: Do you prefer:
> > 
> > A. Directly processing the HTTP request into a base string for signing (draft-
> > hammer-oauth style).
> > B. Treating the request as an API call with form-encoded parameters (OAuth
> > 1.0 style).
> > C. Converting the request into a normalized message and signing that (Eaton
> > style).
> > 
> > EHL
> > 
> > [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
> > 
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth



From eran@hueniverse.com  Thu Jan 28 15:19:55 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 55B9C3A6990 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:19:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.388
X-Spam-Level: 
X-Spam-Status: No, score=-2.388 tagged_above=-999 required=5 tests=[AWL=0.211,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BZJiaOdJartl for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:19:54 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 4FE8D3A698C for <oauth@ietf.org>; Thu, 28 Jan 2010 15:19:54 -0800 (PST)
Received: (qmail 30283 invoked from network); 28 Jan 2010 23:20:13 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 28 Jan 2010 23:20:13 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 28 Jan 2010 16:20:11 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Paul C. Bryan" <email@pbryan.net>, OAuth WG <oauth@ietf.org>
Date: Thu, 28 Jan 2010 16:20:07 -0700
Thread-Topic: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
Thread-Index: Acqgb04IT+Y83mUmR2+B0k1DY/qaCgAAPd2A
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D251F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1264720295.22963.13.camel@localhost>
In-Reply-To: <1264720295.22963.13.camel@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 23:19:55 -0000

> -----Original Message-----
> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> Of Paul C. Bryan
> Sent: Thursday, January 28, 2010 3:12 PM

> 3. In-browser capabilities (e.g. JavaScript) for manipulating JSON-struct=
ured
> data.
>=20
> That said, there would probably need to be some restrictions on JSON
> encoding in order to support normalization. See
> http://wiki.apache.org/couchdb/SignedDocuments for issues they've had to
> deal with on this front.

These two statements are contradictory because whatever issues there are, i=
t is unlikely that the in-browser support will be able to work around it, l=
eading to more errors and confusion than being helpful.

EHL

>=20
> Paul
>=20
> On Wed, 2010-01-27 at 19:42 -0700, Eran Hammer-Lahav wrote:
> > I don't think we had enough discussion for a consensus call but I would=
 like
> to continue with some combination of A and C. That means, defining a
> message format to normalize the request into (which can be used with XMPP
> and other transports), but to still process the HTTP request and not the =
API
> request into the message. In other words, not process parameters but stil=
l
> turn the request into a message.
> >
> > I will try this in my next draft.
> >
> > My question: what format should we use for this message? The main four
> options are:
> >
> > 1. XML
> > 2. JSON
> > 3. Form-encoded (key=3Dvalue&key=3Dvalue)
> > 4. Text (key-value pair new line separated, or HTTP-header like
> > key=3D"value" comma, etc.)
> >
> > My thinking is: XML is crazy here (complication without benefits), JSON=
 is
> interesting but doesn't add much value beyond other options (unless we
> foresee the need for lists or richer value types), Form-encoded is ok but=
 has
> to be specified due to variations in libraries (well-known OAuth issue), =
and
> Text is easy but requires a custom parser and we need to choose a style.
> >
> > I am inclined to use Text (key=3Dvalue LF) but can be talked into Form-
> encoded or even JSON.
> >
> > Anyone else?
> >
> > EHL
> >
> > > -----Original Message-----
> > > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> > > Behalf Of Eran Hammer-Lahav
> > > Sent: Wednesday, January 13, 2010 9:41 PM
> > > To: OAuth WG
> > > Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
> > > Signing
> > >
> > > Authentication Open Question #1: What to sign?
> > >
> > > OAuth Core 1.0 was designed to sign API requests made using common
> > > form-encoded formats. The main component of the 1.0 signature base
> > > string are the parameters. The host and HTTP methods are important
> > > but were never the focus on the signed content.
> > >
> > > draft-hammer-oauth does not change the process but does describe the
> > > process very differently, changing the focus form signing API
> > > requests and parameters to signing HTTP requests (partially).
> > > draft-hammer-http-token-auth takes this approach a step further and
> > > focuses on signing the raw HTTP request components, completely
> > > ignoring their meaning as used by API calls. The end result is very
> > > similar but the differences are important.
> > >
> > > Brian Eaton proposed [1] an alternative approach to sign messages
> > > instead of API calls or HTTP request. In his proposal, the HTTP
> > > request (or API call based on your perspective) in transformed into
> > > a message (in his case using a JSON- based format) which is then
> > > signed. This additional layer of abstraction allows the use of the
> > > method with other transports or use cases in which parameters are not
> sent in the request URI or body.
> > >
> > > QUESTION: Do you prefer:
> > >
> > > A. Directly processing the HTTP request into a base string for
> > > signing (draft- hammer-oauth style).
> > > B. Treating the request as an API call with form-encoded parameters
> > > (OAuth
> > > 1.0 style).
> > > C. Converting the request into a normalized message and signing that
> > > (Eaton style).
> > >
> > > EHL
> > >
> > > [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
> > >
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth
>=20
>=20
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

From email@pbryan.net  Thu Jan 28 15:27:46 2010
Return-Path: <email@pbryan.net>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 08CC63A69AC for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:27:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.449
X-Spam-Level: 
X-Spam-Status: No, score=-2.449 tagged_above=-999 required=5 tests=[AWL=0.150,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DvbDtl8CL8RT for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 15:27:45 -0800 (PST)
Received: from maple.anode.ca (maple.anode.ca [72.14.183.184]) by core3.amsl.com (Postfix) with ESMTP id E80603A69A7 for <oauth@ietf.org>; Thu, 28 Jan 2010 15:27:44 -0800 (PST)
Received: from [192.168.0.4] (S010600095baae0ff.vf.shawcable.net [174.1.50.199]) by maple.anode.ca (Postfix) with ESMTPSA id E8605EA022 for <oauth@ietf.org>; Thu, 28 Jan 2010 23:28:03 +0000 (UTC)
From: "Paul C. Bryan" <email@pbryan.net>
To: OAuth WG <oauth@ietf.org>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D251F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <C773EE67.2D076%eran@hueniverse.com> <90C41DD21FB7C64BB94121FBBC2E723437899D22B0@P3PW5EX1MB01.EX1.SECURESERVER.NET> <1264720295.22963.13.camel@localhost> <90C41DD21FB7C64BB94121FBBC2E723437899D251F@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Content-Type: text/plain; charset="UTF-8"
Date: Thu, 28 Jan 2010 15:28:00 -0800
Message-ID: <1264721280.22963.17.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.28.1 
Content-Transfer-Encoding: 7bit
Subject: Re: [OAUTH-WG] Request Signing vs. API Signing vs. Message Signing
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jan 2010 23:27:46 -0000

Possibly, although I haven't yet come to the conclusion that these are
incompatible.

Moves to build proper JSON JavaScript libraries rather than rely on the
built-in parser are already tackling some other JSON-related issues, and
could possibly serve to address this issue as well.

Paul

On Thu, 2010-01-28 at 16:20 -0700, Eran Hammer-Lahav wrote:
> 
> > -----Original Message-----
> > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf
> > Of Paul C. Bryan
> > Sent: Thursday, January 28, 2010 3:12 PM
> 
> > 3. In-browser capabilities (e.g. JavaScript) for manipulating JSON-structured
> > data.
> > 
> > That said, there would probably need to be some restrictions on JSON
> > encoding in order to support normalization. See
> > http://wiki.apache.org/couchdb/SignedDocuments for issues they've had to
> > deal with on this front.
> 
> These two statements are contradictory because whatever issues there are, it is unlikely that the in-browser support will be able to work around it, leading to more errors and confusion than being helpful.
> 
> EHL
> 
> > 
> > Paul
> > 
> > On Wed, 2010-01-27 at 19:42 -0700, Eran Hammer-Lahav wrote:
> > > I don't think we had enough discussion for a consensus call but I would like
> > to continue with some combination of A and C. That means, defining a
> > message format to normalize the request into (which can be used with XMPP
> > and other transports), but to still process the HTTP request and not the API
> > request into the message. In other words, not process parameters but still
> > turn the request into a message.
> > >
> > > I will try this in my next draft.
> > >
> > > My question: what format should we use for this message? The main four
> > options are:
> > >
> > > 1. XML
> > > 2. JSON
> > > 3. Form-encoded (key=value&key=value)
> > > 4. Text (key-value pair new line separated, or HTTP-header like
> > > key="value" comma, etc.)
> > >
> > > My thinking is: XML is crazy here (complication without benefits), JSON is
> > interesting but doesn't add much value beyond other options (unless we
> > foresee the need for lists or richer value types), Form-encoded is ok but has
> > to be specified due to variations in libraries (well-known OAuth issue), and
> > Text is easy but requires a custom parser and we need to choose a style.
> > >
> > > I am inclined to use Text (key=value LF) but can be talked into Form-
> > encoded or even JSON.
> > >
> > > Anyone else?
> > >
> > > EHL
> > >
> > > > -----Original Message-----
> > > > From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On
> > > > Behalf Of Eran Hammer-Lahav
> > > > Sent: Wednesday, January 13, 2010 9:41 PM
> > > > To: OAuth WG
> > > > Subject: [OAUTH-WG] Request Signing vs. API Signing vs. Message
> > > > Signing
> > > >
> > > > Authentication Open Question #1: What to sign?
> > > >
> > > > OAuth Core 1.0 was designed to sign API requests made using common
> > > > form-encoded formats. The main component of the 1.0 signature base
> > > > string are the parameters. The host and HTTP methods are important
> > > > but were never the focus on the signed content.
> > > >
> > > > draft-hammer-oauth does not change the process but does describe the
> > > > process very differently, changing the focus form signing API
> > > > requests and parameters to signing HTTP requests (partially).
> > > > draft-hammer-http-token-auth takes this approach a step further and
> > > > focuses on signing the raw HTTP request components, completely
> > > > ignoring their meaning as used by API calls. The end result is very
> > > > similar but the differences are important.
> > > >
> > > > Brian Eaton proposed [1] an alternative approach to sign messages
> > > > instead of API calls or HTTP request. In his proposal, the HTTP
> > > > request (or API call based on your perspective) in transformed into
> > > > a message (in his case using a JSON- based format) which is then
> > > > signed. This additional layer of abstraction allows the use of the
> > > > method with other transports or use cases in which parameters are not
> > sent in the request URI or body.
> > > >
> > > > QUESTION: Do you prefer:
> > > >
> > > > A. Directly processing the HTTP request into a base string for
> > > > signing (draft- hammer-oauth style).
> > > > B. Treating the request as an API call with form-encoded parameters
> > > > (OAuth
> > > > 1.0 style).
> > > > C. Converting the request into a normalized message and signing that
> > > > (Eaton style).
> > > >
> > > > EHL
> > > >
> > > > [1] http://www.ietf.org/mail-archive/web/oauth/current/msg00890.html
> > > >
> > > > _______________________________________________
> > > > OAuth mailing list
> > > > OAuth@ietf.org
> > > > https://www.ietf.org/mailman/listinfo/oauth
> > > _______________________________________________
> > > OAuth mailing list
> > > OAuth@ietf.org
> > > https://www.ietf.org/mailman/listinfo/oauth
> > 
> > 
> > _______________________________________________
> > OAuth mailing list
> > OAuth@ietf.org
> > https://www.ietf.org/mailman/listinfo/oauth



From lshepard@facebook.com  Thu Jan 28 18:35:44 2010
Return-Path: <lshepard@facebook.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B952C3A67DD for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 18:35:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.814
X-Spam-Level: 
X-Spam-Status: No, score=-5.814 tagged_above=-999 required=5 tests=[AWL=-0.150, BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Alaq8LemNfty for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 18:35:33 -0800 (PST)
Received: from mailout-sf2p.facebook.com (mailout-snc1.facebook.com [69.63.179.25]) by core3.amsl.com (Postfix) with ESMTP id 1D0113A67AB for <oauth@ietf.org>; Thu, 28 Jan 2010 18:35:33 -0800 (PST)
Received: from mail.thefacebook.com ([192.168.18.105]) by pp02.snc1.tfbnw.net (8.14.3/8.14.3) with ESMTP id o0T2ZP1R016084 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Thu, 28 Jan 2010 18:35:25 -0800
Received: from SC-MBXC1.TheFacebook.com ([192.168.18.100]) by sc-hub02.TheFacebook.com ([192.168.18.105]) with mapi; Thu, 28 Jan 2010 18:35:49 -0800
From: Luke Shepard <lshepard@facebook.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 28 Jan 2010 18:35:40 -0800
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgLrPcaO2rzz8E5kqUBQr+cLgtywAMADewAAtClug=
Message-ID: <C787897C.1C8A7%lshepard@facebook.com>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C787897C1C8A7lshepardfacebookcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2010-01-28_13:2010-01-20, 2010-01-28, 2010-01-28 signatures=0
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 02:35:44 -0000

--_000_C787897C1C8A7lshepardfacebookcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Thanks for the detailed reply, Eran.

I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn't want to deal with signatures, then =
they never should have to. I want to be able to write a very lightweight SS=
L-only client library that is still fully OAuth 2.0 compatible.

I think instead, the consensus should be:


 *   Support an extensible set of signature algorithms
 *   Servers required to support plaintext tokens over a secure channel (SS=
L/TLS)
 *   Servers required to support at least one or a small subset of encrypti=
on algorithms. Possible candidates include hmac-sha-1, hmac-sha-256, and rs=
assa....
 *   Clients must support at least ONE of the required encryption methods

If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant - that is, it may work with a specific vendor that a=
dvertises support for that algorithm, but it won't work with all servers. A=
s algorithms gradually change over time, client libraries can be upgraded w=
hile servers need to maintain backwards compatibility. (For example, Facebo=
ok will deprecate MD5 as its sig algorithm, but will continue to support it=
 for the clients using it in the wild)

As a concrete example of what can be written when you don't need to worry a=
bout encryption, see: http://github.com/lshepard/oauth-wrap-demo/tree/maste=
r/src/wrap.js
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.


On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote:

Thanks Luke. This is a useful analysis.

I believe we have already reached consensus in this regard:

* Support an extensible set of signature algorithms
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)

(if these assumptions are incorrect, raise your hand now)

The specification is going to define the four methods above (and possibly m=
ore) as *must implement*. This does not mean vendors have to support all of=
 them, but that any *client* library or application claiming to be 'OAuth 2=
.0 compliant' must implement all these methods.

If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
'OAuth 2.0 compliant' because any it can interop with *any* compliant libra=
ry. However, if such a vendor produces a client library for its developers =
which only implements the methods deployed by the vendor, that library is '=
OAuth 2.0 partially compliant' (because it will not interop with *all* vend=
ors).

In practice, from Facebook's perspective, you will be able to deploy OAuth =
2.0 in a compliant way, while only implementing the methods that you find s=
uitable for your developers. It sounds like you will be using the plain met=
hod over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually =
makes things trivial for its developers, I expect Facebook to produce libra=
ries that will implement these two methods, but not others. This will be a =
'Facebook API' library that uses OAuth 2.0. It will be partially compliant =
but this only means it is only guaranteed to work with Facebook, but that i=
t does so in a fully compliant way.

EHL





From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of L=
uke Shepard
Sent: Thursday, January 28, 2010 7:30 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth commun=
ication

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform


--_000_C787897C1C8A7lshepardfacebookcom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth comm=
unication</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:=
11pt'>Thanks for the detailed reply, Eran.<BR>
<BR>
I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn&#8217;t want to deal with signatures,=
 then they never should have to. I want to be able to write a very lightwei=
ght SSL-only client library that is still fully OAuth 2.0 compatible.<BR>
<BR>
I think instead, the consensus should be:<BR>
<BR>
</SPAN></FONT><UL><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SP=
AN STYLE=3D'font-size:11pt'>Support an extensible set of signature algorith=
ms
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN S=
TYLE=3D'font-size:11pt'>Servers required to support plaintext tokens over a=
 secure channel (SSL/TLS)
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN S=
TYLE=3D'font-size:11pt'>Servers required to support at least one or a small=
 subset of encryption algorithms. Possible candidates include hmac-sha-1, h=
mac-sha-256, and rsassa....
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN S=
TYLE=3D'font-size:11pt'>Clients must support at least ONE of the required e=
ncryption methods<BR>
</SPAN></FONT></UL><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN =
STYLE=3D'font-size:11pt'><BR>
If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant &#8211; that is, it may work with a specific vendor =
that advertises support for that algorithm, but it won&#8217;t work with al=
l servers. As algorithms gradually change over time, client libraries can b=
e upgraded while servers need to maintain backwards compatibility. (For exa=
mple, Facebook will deprecate MD5 as its sig algorithm, but will continue t=
o support it for the clients using it in the wild)<BR>
<BR>
As a concrete example of what can be written when you don&#8217;t need to w=
orry about encryption, see: <a href=3D"http://github.com/lshepard/oauth-wra=
p-demo/tree/master/src/wrap.js">http://github.com/lshepard/oauth-wrap-demo/=
tree/master/src/wrap.js</a><BR>
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.<BR>
<BR>
<BR>
On 1/28/10 1:41 PM, &quot;Eran Hammer-Lahav&quot; &lt;<a href=3D"eran@hueni=
verse.com">eran@hueniverse.com</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'>Thanks Luke. This is a useful analysis.<BR>
&nbsp;<BR>
I believe we have already reached consensus in this regard:<BR>
&nbsp;<BR>
* Support an extensible set of signature algorithms<BR>
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256<BR>
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)<BR>
&nbsp;<BR>
(if these assumptions are incorrect, raise your hand now)<BR>
&nbsp;<BR>
The specification is going to define the four methods above (and possibly m=
ore) as *<B>must implement</B>*. This does not mean vendors have to support=
 all of them, but that any *<B>client</B>* library or application claiming =
to be &#8216;OAuth 2.0 compliant&#8217; must implement all these methods.<B=
R>
&nbsp;<BR>
If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
&#8216;OAuth 2.0 compliant&#8217; because any it can interop with *<B>any</=
B>* compliant library. However, if such a vendor produces a client library =
for its developers which only implements the methods deployed by the vendor=
, that library is &#8216;OAuth 2.0 partially compliant&#8217; (because it w=
ill not interop with *<B>all</B>* vendors).<BR>
&nbsp;<BR>
In practice, from Facebook&#8217;s perspective, you will be able to deploy =
OAuth 2.0 in a compliant way, while only implementing the methods that you =
find suitable for your developers. It sounds like you will be using the pla=
in method over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook us=
ually makes things trivial for its developers, I expect Facebook to produce=
 libraries that will implement these two methods, but not others. This will=
 be a &#8216;Facebook API&#8217; library that uses OAuth 2.0. It will be pa=
rtially compliant but this only means it is only guaranteed to work with Fa=
cebook, but that it does so in a fully compliant way.<BR>
&nbsp;<BR>
EHL<BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
&nbsp;<BR>
<BR>
</SPAN><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:10pt'><B>From:</B> <a href=
=3D"oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a href=3D"mailto:o=
auth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>] <B>On Behalf Of <=
/B>Luke Shepard<BR>
<B>Sent:</B> Thursday, January 28, 2010 7:30 AM<BR>
<B>To:</B> <a href=3D"oauth@ietf.org">oauth@ietf.org</a><BR>
<B>Subject:</B> [OAUTH-WG] Discussion of SSL as the primary means for OAuth=
 communication<BR>
</SPAN></FONT></FONT><FONT FACE=3D"Times New Roman"><SPAN STYLE=3D'font-siz=
e:12pt'> <BR>
</SPAN></FONT><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=
=3D'font-size:11pt'>In the discussions around the OAuth WRAP spec, one of t=
he questions often asked is, &#8220;why use SSL exclusively?&#8221; Several=
 of us have done a lot of thinking on it and I wanted to articulate my unde=
rstanding of the pros and cons of the approach for discussion. The use case=
 I primarily have in mind is that of a web service, like Facebook, Twitter,=
 or Google services. Our service is primarily authenticated via the Web, bu=
t we have a use for all of the WRAP profiles (web app, client app, desktop,=
 mobile).<BR>
&nbsp;<BR>
Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.<BR>
<BR>
=3D=3D Advantages of using SSL for API calls<BR>
<BR>
-- It&#8217;s overwhelmingly simpler for developers.<BR>
I&#8217;ve implemented OpenID and OAuth, and I&#8217;ve worked for years wi=
th developers trying to handle signatures on the Facebook Platform. In my e=
xperience, calculating signatures is one of the most complex and difficult =
parts of an authentication protocol, and developers often get it wrong. By =
moving that piece down the stack we can get it out of their way and let dev=
elopers focus on building their apps.<BR>
<BR>
-- Existing tools ecosystem<BR>
It&#8217;s not that SSL is a simpler encryption protocol than OAuth (it&#82=
17;s not) but rather that commonly available tools almost universally suppo=
rt it &#8211; every major web browser, as well as most libraries for making=
 HTTP requests (like curl) have built-in support for SSL. For OAuth 1.0, yo=
u need to use a client library just to construct your very first request.<B=
R>
<BR>
-- Smaller client libraries<BR>
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding. <BR>
<BR>
Wouldn&#8217;t it be great if we could write a protocol that doesn&#8217;t =
even require a client library to implement? If I could just make an authent=
icated API request in my browser, as easily as with Basic Auth?<BR>
<BR>
=3D=3D Disadvantages of using SSL for API calls<BR>
<BR>
-- Difficulties of debugging<BR>
<BR>
Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can&#8217;t sniff a request, and to intercept it=
, you need an HTTP proxy that understands SSL, and you need to worry about =
invalid certificate errors. To aid in this, providers will probably offer a=
 non-SSL endpoint for debugging, but they may need to set up a sandbox envi=
ronment to prevent damage from tokens exposed in plaintext.<BR>
<BR>
-- Variable costs for providers<BR>
<BR>
Server CPU costs will increase when handling SSL requests &#8211; especiall=
y on every API call instead of just at the auth stage. At scale, this can b=
ecome expensive, although it can be offset by using specialized hardware to=
 terminate the SSL connection. All the big companies I&#8217;ve talked to a=
re comfortable trading these higher costs for increased adoption due to the=
 simplicity.<BR>
<BR>
-- Fixed costs for smaller providers<BR>
<BR>
There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.<BR>
<BR>
-- Latency<BR>
<BR>
SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it&#8217;s less of a con=
cern. Already today newer phones can handle SSL just fine.<BR>
<BR>
-- Browser limitations for cross domain communication<BR>
<BR>
A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.<BR>
<BR>
-- Verifying information on the relying party<BR>
<BR>
If information is passed from a Service Provider to a Consumer through the =
user&#8217;s browser, then that information cannot be verified without an A=
PI call, unless a signature is provided. Similar to stateful vs. stateless =
mode in the OpenID 2.0 spec, the signature can serve as a performance enhan=
cement to avoid an API call.<BR>
<BR>
=3D=3D Providing a non-SSL option for the short head<BR>
<BR>
Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.<BR>
<BR>
Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.<BR>
<BR>
However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it&#8217;s pretty important that OAuth 2.=
0 support a method other than SSL as an option for advanced developers. But=
 it should be just that &#8211; an option, and only for advanced developers=
, so that beginning programmers and folks learning an API don&#8217;t need =
to worry about signatures when they just want to play around.<BR>
<BR>
Please let me know if I&#8217;m missing something or if my assumptions soun=
d incorrect.<BR>
<BR>
-Luke Shepard<BR>
Software Engineer, Facebook Platform<BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C787897C1C8A7lshepardfacebookcom_--

From eran@hueniverse.com  Thu Jan 28 19:10:54 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 587863A67E2 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 19:10:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level: 
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[AWL=-0.109, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mGpCmCmVgR5J for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 19:10:37 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 7D8C83A6853 for <oauth@ietf.org>; Thu, 28 Jan 2010 19:10:37 -0800 (PST)
Received: (qmail 30198 invoked from network); 29 Jan 2010 03:10:57 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Jan 2010 03:10:56 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Thu, 28 Jan 2010 20:10:53 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Luke Shepard <lshepard@facebook.com>, "oauth@ietf.org" <oauth@ietf.org>
Date: Thu, 28 Jan 2010 20:10:49 -0700
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgLrPcaO2rzz8E5kqUBQr+cLgtywAMADewAAtClugAAHjh4A==
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D258E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <C787897C.1C8A7%lshepard@facebook.com>
In-Reply-To: <C787897C.1C8A7%lshepard@facebook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723437899D258EP3PW5EX1MB01E_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 03:10:54 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D258EP3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

(For the sake of simplicity, I am going to refer to the Plain bearer token =
with SSL/TLS as S-Plain)

WRAP appeal is also its limitation and (strictly as written) it sacrifices =
security for client ease. We still don't know what OAuth 2.0 is (it is *not=
* WRAP, but likely to include ideas from it).

The problem I have with your approach is that you are mandating server depl=
oyment and given that this is a security protocol, we have no business tell=
ing servers what they MUST implement (they might consider S-Plain too weak =
for their needs). There are many reasons why vendors would rather not use t=
he S-Plain option (you listed some of those) for every protected resource r=
equest. There are also many reasons why vendors would only support S-Plain =
and no signature option.

My proposal allows you to do everything you have asked for and your develop=
ers will have an easy life with the S-Plain option, or performance / flexib=
ility with one of the HMAC methods. But the advantage is that I do not mand=
ate Facebook to do anything it doesn't want. Any OAuth 2.0 client will work=
 with Facebook.

It is true that writing a fully compliant client will require more work. Bu=
t the whole point of the S-Plain option is that it requires *no* additional=
 library beyond having SSL/TLS available. So this is a vendor support issue=
 - if you want to enable a library-less client development, offer S-Plain. =
This again, is a vendor choice.

Also keep in mind that the current proposal moves the algorithm choice to t=
he token request/issue phase. Each token will only work with a single algor=
ithm (which is better cryptographic hygiene). So a vendor can choose to all=
ow the client to pick the algorithm they want to you, or just tell them whi=
ch one they are going to use.

EHL


From: Luke Shepard [mailto:lshepard@facebook.com]
Sent: Thursday, January 28, 2010 6:36 PM
To: Eran Hammer-Lahav; oauth@ietf.org
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication

Thanks for the detailed reply, Eran.

I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn't want to deal with signatures, then =
they never should have to. I want to be able to write a very lightweight SS=
L-only client library that is still fully OAuth 2.0 compatible.

I think instead, the consensus should be:

 *   Support an extensible set of signature algorithms
 *   Servers required to support plaintext tokens over a secure channel (SS=
L/TLS)
 *   Servers required to support at least one or a small subset of encrypti=
on algorithms. Possible candidates include hmac-sha-1, hmac-sha-256, and rs=
assa....
 *   Clients must support at least ONE of the required encryption methods

If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant - that is, it may work with a specific vendor that a=
dvertises support for that algorithm, but it won't work with all servers. A=
s algorithms gradually change over time, client libraries can be upgraded w=
hile servers need to maintain backwards compatibility. (For example, Facebo=
ok will deprecate MD5 as its sig algorithm, but will continue to support it=
 for the clients using it in the wild)

As a concrete example of what can be written when you don't need to worry a=
bout encryption, see: http://github.com/lshepard/oauth-wrap-demo/tree/maste=
r/src/wrap.js
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.


On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote:
Thanks Luke. This is a useful analysis.

I believe we have already reached consensus in this regard:

* Support an extensible set of signature algorithms
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)

(if these assumptions are incorrect, raise your hand now)

The specification is going to define the four methods above (and possibly m=
ore) as *must implement*. This does not mean vendors have to support all of=
 them, but that any *client* library or application claiming to be 'OAuth 2=
.0 compliant' must implement all these methods.

If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
'OAuth 2.0 compliant' because any it can interop with *any* compliant libra=
ry. However, if such a vendor produces a client library for its developers =
which only implements the methods deployed by the vendor, that library is '=
OAuth 2.0 partially compliant' (because it will not interop with *all* vend=
ors).

In practice, from Facebook's perspective, you will be able to deploy OAuth =
2.0 in a compliant way, while only implementing the methods that you find s=
uitable for your developers. It sounds like you will be using the plain met=
hod over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually =
makes things trivial for its developers, I expect Facebook to produce libra=
ries that will implement these two methods, but not others. This will be a =
'Facebook API' library that uses OAuth 2.0. It will be partially compliant =
but this only means it is only guaranteed to work with Facebook, but that i=
t does so in a fully compliant way.

EHL





From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of L=
uke Shepard
Sent: Thursday, January 28, 2010 7:30 AM
To: oauth@ietf.org
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth commun=
ication

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D258EP3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><title>Re: [OAUTH-WG] Discussion of SSL as t=
he primary means for OAuth communication</title><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:852689256;
	mso-list-template-ids:523136106;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>(For the =
sake of simplicity, I am going to refer to the Plain bearer token with SSL/=
TLS as S-Plain)<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'fo=
nt-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp=
;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font=
-family:"Calibri","sans-serif";color:#1F497D'>WRAP appeal is also its limit=
ation and (strictly as written) it sacrifices security for client ease. We =
still don&#8217;t know what OAuth 2.0 is (it is *<b>not</b>* WRAP, but like=
ly to include ideas from it).<o:p></o:p></span></p><p class=3DMsoNormal><sp=
an style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F49=
7D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span style=3D'font-si=
ze:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>The problem I h=
ave with your approach is that you are mandating server deployment and give=
n that this is a security protocol, we have no business telling servers wha=
t they MUST implement (they might consider S-Plain too weak for their needs=
). There are many reasons why vendors would rather not use the S-Plain opti=
on (you listed some of those) for every protected resource request. There a=
re also many reasons why vendors would only support S-Plain and no signatur=
e option.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-siz=
e:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p=
></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-famil=
y:"Calibri","sans-serif";color:#1F497D'>My proposal allows you to do everyt=
hing you have asked for and your developers will have an easy life with the=
 S-Plain option, or performance / flexibility with one of the HMAC methods.=
 But the advantage is that I do not mandate Facebook to do anything it does=
n&#8217;t want. Any OAuth 2.0 client will work with Facebook.<o:p></o:p></s=
pan></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'>It is true that writing a fully compliant client will requ=
ire more work. But the whole point of the S-Plain option is that it require=
s *<b>no</b>* additional library beyond having SSL/TLS available. So this i=
s a vendor support issue &#8211; if you want to enable a library-less clien=
t development, offer S-Plain. This again, is a vendor choice.<o:p></o:p></s=
pan></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3D=
MsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif=
";color:#1F497D'>Also keep in mind that the current proposal moves the algo=
rithm choice to the token request/issue phase. Each token will only work wi=
th a single algorithm (which is better cryptographic hygiene). So a vendor =
can choose to allow the client to pick the algorithm they want to you, or j=
ust tell them which one they are going to use.<o:p></o:p></span></p><p clas=
s=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-s=
erif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span=
 style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D=
'>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11=
.0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></s=
pan></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style=
=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><di=
v><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0i=
n 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-fam=
ily:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;=
font-family:"Tahoma","sans-serif"'> Luke Shepard [mailto:lshepard@facebook.=
com] <br><b>Sent:</b> Thursday, January 28, 2010 6:36 PM<br><b>To:</b> Eran=
 Hammer-Lahav; oauth@ietf.org<br><b>Subject:</b> Re: [OAUTH-WG] Discussion =
of SSL as the primary means for OAuth communication<o:p></o:p></span></p></=
div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal st=
yle=3D'margin-bottom:12.0pt'><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif"'>Thanks for the detailed reply, Eran.<br><br>I think t=
hat your proposed design has it backwards: servers should bear complexity a=
nd one-time costs, not clients. Much of why I think OAuth WRAP / 2.0 is so =
appealing is that it dramatically simplifies life for developers. If a clie=
nt can support SSL and doesn&#8217;t want to deal with signatures, then the=
y never should have to. I want to be able to write a very lightweight SSL-o=
nly client library that is still fully OAuth 2.0 compatible.<br><br>I think=
 instead, the consensus should be:</span><o:p></o:p></p><ul type=3Ddisc><li=
 class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:a=
uto;mso-list:l0 level1 lfo1'><span style=3D'font-size:11.0pt;font-family:"C=
alibri","sans-serif"'>Support an extensible set of signature algorithms </s=
pan><o:p></o:p></li><li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;=
mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo1'><span style=3D'font-siz=
e:11.0pt;font-family:"Calibri","sans-serif"'>Servers required to support pl=
aintext tokens over a secure channel (SSL/TLS) </span><o:p></o:p></li><li c=
lass=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:aut=
o;mso-list:l0 level1 lfo1'><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif"'>Servers required to support at least one or a small sub=
set of encryption algorithms. Possible candidates include hmac-sha-1, hmac-=
sha-256, and rsassa.... </span><o:p></o:p></li><li class=3DMsoNormal style=
=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 l=
fo1'><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Cl=
ients must support at least ONE of the required encryption methods</span><o=
:p></o:p></li></ul><p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><spa=
n style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><br>If a cl=
ient supports at least one of the required methods (SSL or one of the algor=
ithms), then it can be considered fully OAuth 2.0 compliant. If it only sup=
ports encryption methods that are not in the required list, then it is part=
ially compliant &#8211; that is, it may work with a specific vendor that ad=
vertises support for that algorithm, but it won&#8217;t work with all serve=
rs. As algorithms gradually change over time, client libraries can be upgra=
ded while servers need to maintain backwards compatibility. (For example, F=
acebook will deprecate MD5 as its sig algorithm, but will continue to suppo=
rt it for the clients using it in the wild)<br><br>As a concrete example of=
 what can be written when you don&#8217;t need to worry about encryption, s=
ee: <a href=3D"http://github.com/lshepard/oauth-wrap-demo/tree/master/src/w=
rap.js">http://github.com/lshepard/oauth-wrap-demo/tree/master/src/wrap.js<=
/a><br>If I were to modify that JS to accommodate multiple signature algori=
thms, then I would need to include at least another 1-2k of JavaScript for =
each method just in case. That would be fairly ridiculous.<br><br><br>On 1/=
28/10 1:41 PM, &quot;Eran Hammer-Lahav&quot; &lt;<a href=3D"eran@hueniverse=
.com">eran@hueniverse.com</a>&gt; wrote:</span><o:p></o:p></p><p class=3DMs=
oNormal style=3D'margin-bottom:12.0pt'><span style=3D'font-size:11.0pt;font=
-family:"Calibri","sans-serif"'>Thanks Luke. This is a useful analysis.<br>=
&nbsp;<br>I believe we have already reached consensus in this regard:<br>&n=
bsp;<br>* Support an extensible set of signature algorithms<br>* Define hma=
c-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256<br>* Define a plain me=
thod for bearer tokens and either require SSL/TLS or strongly recommend it =
(open issue)<br>&nbsp;<br>(if these assumptions are incorrect, raise your h=
and now)<br>&nbsp;<br>The specification is going to define the four methods=
 above (and possibly more) as *<b>must implement</b>*. This does not mean v=
endors have to support all of them, but that any *<b>client</b>* library or=
 application claiming to be &#8216;OAuth 2.0 compliant&#8217; must implemen=
t all these methods.<br>&nbsp;<br>If a vendor issues tokens not using all t=
hese methods (which is more likely), it does not have to implement all thes=
e methods and can still be called &#8216;OAuth 2.0 compliant&#8217; because=
 any it can interop with *<b>any</b>* compliant library. However, if such a=
 vendor produces a client library for its developers which only implements =
the methods deployed by the vendor, that library is &#8216;OAuth 2.0 partia=
lly compliant&#8217; (because it will not interop with *<b>all</b>* vendors=
).<br>&nbsp;<br>In practice, from Facebook&#8217;s perspective, you will be=
 able to deploy OAuth 2.0 in a compliant way, while only implementing the m=
ethods that you find suitable for your developers. It sounds like you will =
be using the plain method over SSL and either hmac-sha-1 or hmac-sha-256. S=
ince Facebook usually makes things trivial for its developers, I expect Fac=
ebook to produce libraries that will implement these two methods, but not o=
thers. This will be a &#8216;Facebook API&#8217; library that uses OAuth 2.=
0. It will be partially compliant but this only means it is only guaranteed=
 to work with Facebook, but that it does so in a fully compliant way.<br>&n=
bsp;<br>EHL<br>&nbsp;<br>&nbsp;<br>&nbsp;<br>&nbsp;<br><br></span><b><span =
style=3D'font-size:10.0pt;font-family:"Calibri","sans-serif"'>From:</span><=
/b><span style=3D'font-size:10.0pt;font-family:"Calibri","sans-serif"'> <a =
href=3D"oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> [<a href=3D"mail=
to:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>] <b>On Behalf =
Of </b>Luke Shepard<br><b>Sent:</b> Thursday, January 28, 2010 7:30 AM<br><=
b>To:</b> <a href=3D"oauth@ietf.org">oauth@ietf.org</a><br><b>Subject:</b> =
[OAUTH-WG] Discussion of SSL as the primary means for OAuth communication<b=
r></span><br><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif"'>In the discussions around the OAuth WRAP spec, one of the questions o=
ften asked is, &#8220;why use SSL exclusively?&#8221; Several of us have do=
ne a lot of thinking on it and I wanted to articulate my understanding of t=
he pros and cons of the approach for discussion. The use case I primarily h=
ave in mind is that of a web service, like Facebook, Twitter, or Google ser=
vices. Our service is primarily authenticated via the Web, but we have a us=
e for all of the WRAP profiles (web app, client app, desktop, mobile).<br>&=
nbsp;<br>Overall, I think that the simplicity of using SSL outweighs all th=
e associated costs for most developers. However, we should offer plaintext =
signatures as an optional performance enhancement for advanced developers.<=
br><br>=3D=3D Advantages of using SSL for API calls<br><br>-- It&#8217;s ov=
erwhelmingly simpler for developers.<br>I&#8217;ve implemented OpenID and O=
Auth, and I&#8217;ve worked for years with developers trying to handle sign=
atures on the Facebook Platform. In my experience, calculating signatures i=
s one of the most complex and difficult parts of an authentication protocol=
, and developers often get it wrong. By moving that piece down the stack we=
 can get it out of their way and let developers focus on building their app=
s.<br><br>-- Existing tools ecosystem<br>It&#8217;s not that SSL is a simpl=
er encryption protocol than OAuth (it&#8217;s not) but rather that commonly=
 available tools almost universally support it &#8211; every major web brow=
ser, as well as most libraries for making HTTP requests (like curl) have bu=
ilt-in support for SSL. For OAuth 1.0, you need to use a client library jus=
t to construct your very first request.<br><br>-- Smaller client libraries<=
br>A good chunk of code in many client libraries is devoted to calculating =
and verifying signatures. For example, the OpenID PHP library imports sever=
al BigMath modules and encryption schemes. Even the relatively simpler Face=
book client library requires several functions to sign requests. This makes=
 the client libraries a black box and impedes understanding. <br><br>Wouldn=
&#8217;t it be great if we could write a protocol that doesn&#8217;t even r=
equire a client library to implement? If I could just make an authenticated=
 API request in my browser, as easily as with Basic Auth?<br><br>=3D=3D Dis=
advantages of using SSL for API calls<br><br>-- Difficulties of debugging<b=
r><br>Both signatures and SSL present difficulties in debugging, but they t=
end to be different. While with signatures you worry about composing the ar=
guments wrong or using the wrong algorithm, with SSL you worry about readin=
g the request over the wire. You can&#8217;t sniff a request, and to interc=
ept it, you need an HTTP proxy that understands SSL, and you need to worry =
about invalid certificate errors. To aid in this, providers will probably o=
ffer a non-SSL endpoint for debugging, but they may need to set up a sandbo=
x environment to prevent damage from tokens exposed in plaintext.<br><br>--=
 Variable costs for providers<br><br>Server CPU costs will increase when ha=
ndling SSL requests &#8211; especially on every API call instead of just at=
 the auth stage. At scale, this can become expensive, although it can be of=
fset by using specialized hardware to terminate the SSL connection. All the=
 big companies I&#8217;ve talked to are comfortable trading these higher co=
sts for increased adoption due to the simplicity.<br><br>-- Fixed costs for=
 smaller providers<br><br>There is a fixed cost to obtaining and signing an=
 SSL certificates, although that has dropped in recent years such that an o=
perator can have a cert signed for a single domain for pretty cheap.<br><br=
>-- Latency<br><br>SSL connections take more time to establish than normal =
HTTP connections. Servers can use specialized hardware to speed it up, but =
clients rarely do, which means that for client-to-server API requests, ther=
e may be some higher latency in each request. Smaller, mobile devices may b=
e disproportionately affected by this, but as they grow more powerful it&#8=
217;s less of a concern. Already today newer phones can handle SSL just fin=
e.<br><br>-- Browser limitations for cross domain communication<br><br>A mo=
re niche disadvantage is that some cross domain communication techniques re=
quire the protocol of the parent page to match that of the endpoint being q=
ueried. So for example, in some browsers, for some API calls, it would be i=
mpossible to make an API call to an HTTPS endpoint from a normal HTTP page.=
 However, as browsers advance and HTML5 methods like postMessage become mor=
e common, this will become less of an issue.<br><br>-- Verifying informatio=
n on the relying party<br><br>If information is passed from a Service Provi=
der to a Consumer through the user&#8217;s browser, then that information c=
annot be verified without an API call, unless a signature is provided. Simi=
lar to stateful vs. stateless mode in the OpenID 2.0 spec, the signature ca=
n serve as a performance enhancement to avoid an API call.<br><br>=3D=3D Pr=
oviding a non-SSL option for the short head<br><br>Most platforms tend to h=
ave a small number of fairly large developers and then a really large numbe=
r of smaller developers. The former are typically experienced (or at least,=
 they are by the time they get big) and have made a large investment in the=
 platform. The latter range from experienced developers to amateurs to folk=
s that would not typically program. For this spec to be successful, it must=
 meet the needs of both groups.<br><br>Facebook is very interested in adopt=
ing OAuth WRAP / 2.0 / whatever because we want to help our long tail devel=
opers use our platform more easily. For the long tail, the simplicity provi=
ded by SSL will be crucial. It means smaller or nonexistent client libaries=
, it means that developers can just try out the API by typing it into a web=
 browser, and it will help reduce debugging and maintenance costs.<br><br>H=
owever, for the short head of high volume developers, we probably want an o=
ption to use something other than SSL to make secure requests. These develo=
pers tend to have already solved the low hanging performance fruit, and for=
 them it may be a significant penalty to pay the SSL connection cost on eve=
ry request. To that end, I think it&#8217;s pretty important that OAuth 2.0=
 support a method other than SSL as an option for advanced developers. But =
it should be just that &#8211; an option, and only for advanced developers,=
 so that beginning programmers and folks learning an API don&#8217;t need t=
o worry about signatures when they just want to play around.<br><br>Please =
let me know if I&#8217;m missing something or if my assumptions sound incor=
rect.<br><br>-Luke Shepard<br>Software Engineer, Facebook Platform</span><o=
:p></o:p></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D258EP3PW5EX1MB01E_--

From recordond@gmail.com  Thu Jan 28 22:33:05 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0674D3A68B2 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 22:33:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fok99xLKreGU for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 22:33:02 -0800 (PST)
Received: from mail-iw0-f180.google.com (mail-iw0-f180.google.com [209.85.223.180]) by core3.amsl.com (Postfix) with ESMTP id 8F76128B797 for <oauth@ietf.org>; Thu, 28 Jan 2010 22:33:01 -0800 (PST)
Received: by iwn10 with SMTP id 10so1600139iwn.22 for <oauth@ietf.org>; Thu, 28 Jan 2010 22:33:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=FY2qtCLNNvJSA7i70IYHfnwqw3wGPkyvYKObFzErjBs=; b=rTdFrhPTmXrY5I0QAz9AJZsyWzqHFS4ph1UlFJdIWojB/alANv3V8SQdfxU1zik7TZ d/Bn+bVxkaqnen//0kX7jCTkaYBcee9L7hWvgq9odwNuXlkxjFchLzAcsxn+amjgxtW8 v4emZSjljPomoTErbIqkVidbkIWgVFIunmASU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=BtiDhXWSXcSQKkcYn1YQiRg05nEyEMxj3jahwBkY+8xujGmsrQynfpvADCbqhttplb bhEuNOugAzEQk1wi1833uihjPmVhHBgJAyJ473hi4YXsZ5Q0LfBIowvx+d1CcQitgra0 gVokZrRK3oo9w7hCcSFMzpAZSSLdDI3w5TCzo=
MIME-Version: 1.0
Received: by 10.231.160.205 with SMTP id o13mr687873ibx.13.1264746799609; Thu,  28 Jan 2010 22:33:19 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D258E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <C787897C.1C8A7%lshepard@facebook.com> <90C41DD21FB7C64BB94121FBBC2E723437899D258E@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Thu, 28 Jan 2010 22:33:19 -0800
Message-ID: <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=00504502f681b8b7a6047e47cf02
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 06:33:05 -0000

--00504502f681b8b7a6047e47cf02
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav <eran@hueniverse.com>wro=
te:

> (For the sake of simplicity, I am going to refer to the Plain bearer toke=
n
> with SSL/TLS as S-Plain)
>
> WRAP appeal is also its limitation and (strictly as written) it sacrifice=
s
> security for client ease. We still don=92t know what OAuth 2.0 is (it is =
**
> not** WRAP, but likely to include ideas from it).
>
How is security sacrificed in the S-Plain method proposed for OAuth 2.0?  I
understand that WRAP makes sacrifices, but am I missing something in terms
of moving a Plain bearer token always over SSL/TLS when making
authentication requests?

The problem I have with your approach is that you are mandating server
> deployment and given that this is a security protocol, we have no busines=
s
> telling servers what they MUST implement (they might consider S-Plain too
> weak for their needs). There are many reasons why vendors would rather no=
t
> use the S-Plain option (you listed some of those) for every protected
> resource request. There are also many reasons why vendors would only supp=
ort
> S-Plain and no signature option.
>
> My proposal allows you to do everything you have asked for and your
> developers will have an easy life with the S-Plain option, or performance=
 /
> flexibility with one of the HMAC methods. But the advantage is that I do =
not
> mandate Facebook to do anything it doesn=92t want. Any OAuth 2.0 client w=
ill
> work with Facebook.
>
> It is true that writing a fully compliant client will require more work.
> But the whole point of the S-Plain option is that it requires **no**
> additional library beyond having SSL/TLS available. So this is a vendor
> support issue =96 if you want to enable a library-less client development=
,
> offer S-Plain. This again, is a vendor choice.
>
Yes, but the tradeoff here is that a client will have S-Plain plus two or
three other algorithms.  The library size is increased, the complexity is
increased, and it encourages servers (like Facebook) to develop separate
libraries which only support the one or two methods they have chosen to use=
.
 Luke and I would like to avoid creating Facebook specific client libraries=
.
 (This is of course based on the assumption that the majority of
implementations will adopt S-Plain.  We then envision an advanced client
library which also implements HMAC SHA-256.)

Also keep in mind that the current proposal moves the algorithm choice to
> the token request/issue phase. Each token will only work with a single
> algorithm (which is better cryptographic hygiene). So a vendor can choose=
 to
> allow the client to pick the algorithm they want to you, or just tell the=
m
> which one they are going to use.
>
>
>
> EHL
>
>
>
>
>
> *From:* Luke Shepard [mailto:lshepard@facebook.com]
> *Sent:* Thursday, January 28, 2010 6:36 PM
> *To:* Eran Hammer-Lahav; oauth@ietf.org
> *Subject:* Re: [OAUTH-WG] Discussion of SSL as the primary means for OAut=
h
> communication
>
>
>
> Thanks for the detailed reply, Eran.
>
> I think that your proposed design has it backwards: servers should bear
> complexity and one-time costs, not clients. Much of why I think OAuth WRA=
P /
> 2.0 is so appealing is that it dramatically simplifies life for developer=
s.
> If a client can support SSL and doesn=92t want to deal with signatures, t=
hen
> they never should have to. I want to be able to write a very lightweight
> SSL-only client library that is still fully OAuth 2.0 compatible.
>
> I think instead, the consensus should be:
>
>    - Support an extensible set of signature algorithms
>    - Servers required to support plaintext tokens over a secure channel
>    (SSL/TLS)
>    - Servers required to support at least one or a small subset of
>    encryption algorithms. Possible candidates include hmac-sha-1, hmac-sh=
a-256,
>    and rsassa....
>    - Clients must support at least ONE of the required encryption methods
>
>
> If a client supports at least one of the required methods (SSL or one of
> the algorithms), then it can be considered fully OAuth 2.0 compliant. If =
it
> only supports encryption methods that are not in the required list, then =
it
> is partially compliant =96 that is, it may work with a specific vendor th=
at
> advertises support for that algorithm, but it won=92t work with all serve=
rs.
> As algorithms gradually change over time, client libraries can be upgrade=
d
> while servers need to maintain backwards compatibility. (For example,
> Facebook will deprecate MD5 as its sig algorithm, but will continue to
> support it for the clients using it in the wild)
>
> As a concrete example of what can be written when you don=92t need to wor=
ry
> about encryption, see:
> http://github.com/lshepard/oauth-wrap-demo/tree/master/src/wrap.js
> If I were to modify that JS to accommodate multiple signature algorithms,
> then I would need to include at least another 1-2k of JavaScript for each
> method just in case. That would be fairly ridiculous.
>
>
> On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com> wrote:
>
> Thanks Luke. This is a useful analysis.
>
> I believe we have already reached consensus in this regard:
>
> * Support an extensible set of signature algorithms
> * Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
> * Define a plain method for bearer tokens and either require SSL/TLS or
> strongly recommend it (open issue)
>
> (if these assumptions are incorrect, raise your hand now)
>
> The specification is going to define the four methods above (and possibly
> more) as **must implement**. This does not mean vendors have to support
> all of them, but that any **client** library or application claiming to b=
e
> =91OAuth 2.0 compliant=92 must implement all these methods.
>
> If a vendor issues tokens not using all these methods (which is more
> likely), it does not have to implement all these methods and can still be
> called =91OAuth 2.0 compliant=92 because any it can interop with **any**
> compliant library. However, if such a vendor produces a client library fo=
r
> its developers which only implements the methods deployed by the vendor,
> that library is =91OAuth 2.0 partially compliant=92 (because it will not =
interop
> with **all** vendors).
>
> In practice, from Facebook=92s perspective, you will be able to deploy OA=
uth
> 2.0 in a compliant way, while only implementing the methods that you find
> suitable for your developers. It sounds like you will be using the plain
> method over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook
> usually makes things trivial for its developers, I expect Facebook to
> produce libraries that will implement these two methods, but not others.
> This will be a =91Facebook API=92 library that uses OAuth 2.0. It will be
> partially compliant but this only means it is only guaranteed to work wit=
h
> Facebook, but that it does so in a fully compliant way.
>
> EHL
>
>
>
>
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org<oauth-bounc=
es@ietf.org>]
> *On Behalf Of *Luke Shepard
> *Sent:* Thursday, January 28, 2010 7:30 AM
> *To:* oauth@ietf.org
> *Subject:* [OAUTH-WG] Discussion of SSL as the primary means for OAuth
> communication
>
> In the discussions around the OAuth WRAP spec, one of the questions often
> asked is, =93why use SSL exclusively?=94 Several of us have done a lot of
> thinking on it and I wanted to articulate my understanding of the pros an=
d
> cons of the approach for discussion. The use case I primarily have in min=
d
> is that of a web service, like Facebook, Twitter, or Google services. Our
> service is primarily authenticated via the Web, but we have a use for all=
 of
> the WRAP profiles (web app, client app, desktop, mobile).
>
> Overall, I think that the simplicity of using SSL outweighs all the
> associated costs for most developers. However, we should offer plaintext
> signatures as an optional performance enhancement for advanced developers=
.
>
> =3D=3D Advantages of using SSL for API calls
>
> -- It=92s overwhelmingly simpler for developers.
> I=92ve implemented OpenID and OAuth, and I=92ve worked for years with
> developers trying to handle signatures on the Facebook Platform. In my
> experience, calculating signatures is one of the most complex and difficu=
lt
> parts of an authentication protocol, and developers often get it wrong. B=
y
> moving that piece down the stack we can get it out of their way and let
> developers focus on building their apps.
>
> -- Existing tools ecosystem
> It=92s not that SSL is a simpler encryption protocol than OAuth (it=92s n=
ot)
> but rather that commonly available tools almost universally support it =
=96
> every major web browser, as well as most libraries for making HTTP reques=
ts
> (like curl) have built-in support for SSL. For OAuth 1.0, you need to use=
 a
> client library just to construct your very first request.
>
> -- Smaller client libraries
> A good chunk of code in many client libraries is devoted to calculating a=
nd
> verifying signatures. For example, the OpenID PHP library imports several
> BigMath modules and encryption schemes. Even the relatively simpler Faceb=
ook
> client library requires several functions to sign requests. This makes th=
e
> client libraries a black box and impedes understanding.
>
> Wouldn=92t it be great if we could write a protocol that doesn=92t even r=
equire
> a client library to implement? If I could just make an authenticated API
> request in my browser, as easily as with Basic Auth?
>
> =3D=3D Disadvantages of using SSL for API calls
>
> -- Difficulties of debugging
>
> Both signatures and SSL present difficulties in debugging, but they tend =
to
> be different. While with signatures you worry about composing the argumen=
ts
> wrong or using the wrong algorithm, with SSL you worry about reading the
> request over the wire. You can=92t sniff a request, and to intercept it, =
you
> need an HTTP proxy that understands SSL, and you need to worry about inva=
lid
> certificate errors. To aid in this, providers will probably offer a non-S=
SL
> endpoint for debugging, but they may need to set up a sandbox environment=
 to
> prevent damage from tokens exposed in plaintext.
>
> -- Variable costs for providers
>
> Server CPU costs will increase when handling SSL requests =96 especially =
on
> every API call instead of just at the auth stage. At scale, this can beco=
me
> expensive, although it can be offset by using specialized hardware to
> terminate the SSL connection. All the big companies I=92ve talked to are
> comfortable trading these higher costs for increased adoption due to the
> simplicity.
>
> -- Fixed costs for smaller providers
>
> There is a fixed cost to obtaining and signing an SSL certificates,
> although that has dropped in recent years such that an operator can have =
a
> cert signed for a single domain for pretty cheap.
>
> -- Latency
>
> SSL connections take more time to establish than normal HTTP connections.
> Servers can use specialized hardware to speed it up, but clients rarely d=
o,
> which means that for client-to-server API requests, there may be some hig=
her
> latency in each request. Smaller, mobile devices may be disproportionatel=
y
> affected by this, but as they grow more powerful it=92s less of a concern=
.
> Already today newer phones can handle SSL just fine.
>
> -- Browser limitations for cross domain communication
>
> A more niche disadvantage is that some cross domain communication
> techniques require the protocol of the parent page to match that of the
> endpoint being queried. So for example, in some browsers, for some API
> calls, it would be impossible to make an API call to an HTTPS endpoint fr=
om
> a normal HTTP page. However, as browsers advance and HTML5 methods like
> postMessage become more common, this will become less of an issue.
>
> -- Verifying information on the relying party
>
> If information is passed from a Service Provider to a Consumer through th=
e
> user=92s browser, then that information cannot be verified without an API
> call, unless a signature is provided. Similar to stateful vs. stateless m=
ode
> in the OpenID 2.0 spec, the signature can serve as a performance enhancem=
ent
> to avoid an API call.
>
> =3D=3D Providing a non-SSL option for the short head
>
> Most platforms tend to have a small number of fairly large developers and
> then a really large number of smaller developers. The former are typicall=
y
> experienced (or at least, they are by the time they get big) and have mad=
e a
> large investment in the platform. The latter range from experienced
> developers to amateurs to folks that would not typically program. For thi=
s
> spec to be successful, it must meet the needs of both groups.
>
> Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever becau=
se
> we want to help our long tail developers use our platform more easily. Fo=
r
> the long tail, the simplicity provided by SSL will be crucial. It means
> smaller or nonexistent client libaries, it means that developers can just
> try out the API by typing it into a web browser, and it will help reduce
> debugging and maintenance costs.
>
> However, for the short head of high volume developers, we probably want a=
n
> option to use something other than SSL to make secure requests. These
> developers tend to have already solved the low hanging performance fruit,
> and for them it may be a significant penalty to pay the SSL connection co=
st
> on every request. To that end, I think it=92s pretty important that OAuth=
 2.0
> support a method other than SSL as an option for advanced developers. But=
 it
> should be just that =96 an option, and only for advanced developers, so t=
hat
> beginning programmers and folks learning an API don=92t need to worry abo=
ut
> signatures when they just want to play around.
>
> Please let me know if I=92m missing something or if my assumptions sound
> incorrect.
>
> -Luke Shepard
> Software Engineer, Facebook Platform
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--00504502f681b8b7a6047e47cf02
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav <span dir=3D"ltr">&lt;<a=
 href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt;</span> wro=
te:<br><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div><p class=3D"MsoNorm=
al"><span style=3D"font-size:11.0pt;color:#1F497D">(For the sake of simplic=
ity, I am going to refer to the Plain bearer token with SSL/TLS as S-Plain)=
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">WRAP =
appeal is also its limitation and (strictly as written) it sacrifices secur=
ity for client ease. We still don=92t know what OAuth 2.0 is (it is *<b>not=
</b>* WRAP, but likely to include ideas from it).</span></p>
</div></div></blockquote><div>How is security sacrificed in the S-Plain met=
hod proposed for OAuth 2.0? =A0I understand that WRAP makes sacrifices, but=
 am I missing something in terms of moving a Plain bearer token always over=
 SSL/TLS when making authentication requests?</div>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex;"><div lang=3D"EN-US" link=3D"=
blue" vlink=3D"purple"><div><p class=3D"MsoNormal"><span style=3D"font-size=
:11.0pt;color:#1F497D">The problem I have with your approach is that you ar=
e mandating server deployment and given that this is a security protocol, w=
e have no business telling servers what they MUST implement (they might con=
sider S-Plain too weak for their needs). There are many reasons why vendors=
 would rather not use the S-Plain option (you listed some of those) for eve=
ry protected resource request. There are also many reasons why vendors woul=
d only support S-Plain and no signature option.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">My pr=
oposal allows you to do everything you have asked for and your developers w=
ill have an easy life with the S-Plain option, or performance / flexibility=
 with one of the HMAC methods. But the advantage is that I do not mandate F=
acebook to do anything it doesn=92t want. Any OAuth 2.0 client will work wi=
th Facebook.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">It is=
 true that writing a fully compliant client will require more work. But the=
 whole point of the S-Plain option is that it requires *<b>no</b>* addition=
al library beyond having SSL/TLS available. So this is a vendor support iss=
ue =96 if you want to enable a library-less client development, offer S-Pla=
in. This again, is a vendor choice.</span></p>
</div></div></blockquote><div>Yes, but the tradeoff here is that a client w=
ill have S-Plain plus two or three other=A0algorithms. =A0The library size =
is increased, the complexity is increased, and it encourages servers (like =
Facebook) to develop separate libraries which only support the one or two m=
ethods they have chosen to use. =A0Luke and I would like to avoid creating =
Facebook specific client libraries. =A0(This is of course based on the assu=
mption that the majority of implementations will adopt S-Plain. =A0We then =
envision an advanced client library which also implements HMAC SHA-256.)</d=
iv>
<div><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex;"><div lang=3D"EN-US" link=3D"=
blue" vlink=3D"purple"><div><p class=3D"MsoNormal"><span style=3D"font-size=
:11.0pt;color:#1F497D">Also keep in mind that the current proposal moves th=
e algorithm choice to the token request/issue phase. Each token will only w=
ork with a single algorithm (which is better cryptographic hygiene). So a v=
endor can choose to allow the client to pick the algorithm they want to you=
, or just tell them which one they are going to use.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">=A0</=
span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F49=
7D">EHL</span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;co=
lor:#1F497D">=A0</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">=A0</=
span></p><div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in=
 0in 0in 4.0pt"><div><div style=3D"border:none;border-top:solid #B5C4DF 1.0=
pt;padding:3.0pt 0in 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt">From:</span></b>=
<span style=3D"font-size:10.0pt"> Luke Shepard [mailto:<a href=3D"mailto:ls=
hepard@facebook.com" target=3D"_blank">lshepard@facebook.com</a>] <br><b>Se=
nt:</b> Thursday, January 28, 2010 6:36 PM<br>
<b>To:</b> Eran Hammer-Lahav; <a href=3D"mailto:oauth@ietf.org" target=3D"_=
blank">oauth@ietf.org</a><br><b>Subject:</b> Re: [OAUTH-WG] Discussion of S=
SL as the primary means for OAuth communication</span></p></div></div><div>
<div></div><div class=3D"h5"><p class=3D"MsoNormal">=A0</p><p class=3D"MsoN=
ormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-size:11.0pt">Than=
ks for the detailed reply, Eran.<br><br>I think that your proposed design h=
as it backwards: servers should bear complexity and one-time costs, not cli=
ents. Much of why I think OAuth WRAP / 2.0 is so appealing is that it drama=
tically simplifies life for developers. If a client can support SSL and doe=
sn=92t want to deal with signatures, then they never should have to. I want=
 to be able to write a very lightweight SSL-only client library that is sti=
ll fully OAuth 2.0 compatible.<br>
<br>I think instead, the consensus should be:</span></p><ul type=3D"disc"><=
li class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Support an extensib=
le set of signature algorithms </span></li><li class=3D"MsoNormal"><span st=
yle=3D"font-size:11.0pt">Servers required to support plaintext tokens over =
a secure channel (SSL/TLS) </span></li>
<li class=3D"MsoNormal"><span style=3D"font-size:11.0pt">Servers required t=
o support at least one or a small subset of encryption algorithms. Possible=
 candidates include hmac-sha-1, hmac-sha-256, and rsassa.... </span></li><l=
i class=3D"MsoNormal">
<span style=3D"font-size:11.0pt">Clients must support at least ONE of the r=
equired encryption methods</span></li></ul><p class=3D"MsoNormal" style=3D"=
margin-bottom:12.0pt"><span style=3D"font-size:11.0pt"><br>If a client supp=
orts at least one of the required methods (SSL or one of the algorithms), t=
hen it can be considered fully OAuth 2.0 compliant. If it only supports enc=
ryption methods that are not in the required list, then it is partially com=
pliant =96 that is, it may work with a specific vendor that advertises supp=
ort for that algorithm, but it won=92t work with all servers. As algorithms=
 gradually change over time, client libraries can be upgraded while servers=
 need to maintain backwards compatibility. (For example, Facebook will depr=
ecate MD5 as its sig algorithm, but will continue to support it for the cli=
ents using it in the wild)<br>
<br>As a concrete example of what can be written when you don=92t need to w=
orry about encryption, see: <a href=3D"http://github.com/lshepard/oauth-wra=
p-demo/tree/master/src/wrap.js" target=3D"_blank">http://github.com/lshepar=
d/oauth-wrap-demo/tree/master/src/wrap.js</a><br>
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.<br><br><br>On 1/28/10 1=
:41 PM, &quot;Eran Hammer-Lahav&quot; &lt;<a href=3D"http://eran@hueniverse=
.com" target=3D"_blank">eran@hueniverse.com</a>&gt; wrote:</span></p>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><span style=3D"font-s=
ize:11.0pt">Thanks Luke. This is a useful analysis.<br>=A0<br>I believe we =
have already reached consensus in this regard:<br>=A0<br>* Support an exten=
sible set of signature algorithms<br>
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256<br>* Defin=
e a plain method for bearer tokens and either require SSL/TLS or strongly r=
ecommend it (open issue)<br>=A0<br>(if these assumptions are incorrect, rai=
se your hand now)<br>
=A0<br>The specification is going to define the four methods above (and pos=
sibly more) as *<b>must implement</b>*. This does not mean vendors have to =
support all of them, but that any *<b>client</b>* library or application cl=
aiming to be =91OAuth 2.0 compliant=92 must implement all these methods.<br=
>
=A0<br>If a vendor issues tokens not using all these methods (which is more=
 likely), it does not have to implement all these methods and can still be =
called =91OAuth 2.0 compliant=92 because any it can interop with *<b>any</b=
>* compliant library. However, if such a vendor produces a client library f=
or its developers which only implements the methods deployed by the vendor,=
 that library is =91OAuth 2.0 partially compliant=92 (because it will not i=
nterop with *<b>all</b>* vendors).<br>
=A0<br>In practice, from Facebook=92s perspective, you will be able to depl=
oy OAuth 2.0 in a compliant way, while only implementing the methods that y=
ou find suitable for your developers. It sounds like you will be using the =
plain method over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook=
 usually makes things trivial for its developers, I expect Facebook to prod=
uce libraries that will implement these two methods, but not others. This w=
ill be a =91Facebook API=92 library that uses OAuth 2.0. It will be partial=
ly compliant but this only means it is only guaranteed to work with Faceboo=
k, but that it does so in a fully compliant way.<br>
=A0<br>EHL<br>=A0<br>=A0<br>=A0<br>=A0<br><br></span><b><span style=3D"font=
-size:10.0pt">From:</span></b><span style=3D"font-size:10.0pt"> <a href=3D"=
http://oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a>=
 [<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">mailto:oauth-=
bounces@ietf.org</a>] <b>On Behalf Of </b>Luke Shepard<br>
<b>Sent:</b> Thursday, January 28, 2010 7:30 AM<br><b>To:</b> <a href=3D"ht=
tp://oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a><br><b>Subject:</b=
> [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication=
<br>
</span><br><span style=3D"font-size:11.0pt">In the discussions around the O=
Auth WRAP spec, one of the questions often asked is, =93why use SSL exclusi=
vely?=94 Several of us have done a lot of thinking on it and I wanted to ar=
ticulate my understanding of the pros and cons of the approach for discussi=
on. The use case I primarily have in mind is that of a web service, like Fa=
cebook, Twitter, or Google services. Our service is primarily authenticated=
 via the Web, but we have a use for all of the WRAP profiles (web app, clie=
nt app, desktop, mobile).<br>
=A0<br>Overall, I think that the simplicity of using SSL outweighs all the =
associated costs for most developers. However, we should offer plaintext si=
gnatures as an optional performance enhancement for advanced developers.<br=
>
<br>=3D=3D Advantages of using SSL for API calls<br><br>-- It=92s overwhelm=
ingly simpler for developers.<br>I=92ve implemented OpenID and OAuth, and I=
=92ve worked for years with developers trying to handle signatures on the F=
acebook Platform. In my experience, calculating signatures is one of the mo=
st complex and difficult parts of an authentication protocol, and developer=
s often get it wrong. By moving that piece down the stack we can get it out=
 of their way and let developers focus on building their apps.<br>
<br>-- Existing tools ecosystem<br>It=92s not that SSL is a simpler encrypt=
ion protocol than OAuth (it=92s not) but rather that commonly available too=
ls almost universally support it =96 every major web browser, as well as mo=
st libraries for making HTTP requests (like curl) have built-in support for=
 SSL. For OAuth 1.0, you need to use a client library just to construct you=
r very first request.<br>
<br>-- Smaller client libraries<br>A good chunk of code in many client libr=
aries is devoted to calculating and verifying signatures. For example, the =
OpenID PHP library imports several BigMath modules and encryption schemes. =
Even the relatively simpler Facebook client library requires several functi=
ons to sign requests. This makes the client libraries a black box and imped=
es understanding. <br>
<br>Wouldn=92t it be great if we could write a protocol that doesn=92t even=
 require a client library to implement? If I could just make an authenticat=
ed API request in my browser, as easily as with Basic Auth?<br><br>=3D=3D D=
isadvantages of using SSL for API calls<br>
<br>-- Difficulties of debugging<br><br>Both signatures and SSL present dif=
ficulties in debugging, but they tend to be different. While with signature=
s you worry about composing the arguments wrong or using the wrong algorith=
m, with SSL you worry about reading the request over the wire. You can=92t =
sniff a request, and to intercept it, you need an HTTP proxy that understan=
ds SSL, and you need to worry about invalid certificate errors. To aid in t=
his, providers will probably offer a non-SSL endpoint for debugging, but th=
ey may need to set up a sandbox environment to prevent damage from tokens e=
xposed in plaintext.<br>
<br>-- Variable costs for providers<br><br>Server CPU costs will increase w=
hen handling SSL requests =96 especially on every API call instead of just =
at the auth stage. At scale, this can become expensive, although it can be =
offset by using specialized hardware to terminate the SSL connection. All t=
he big companies I=92ve talked to are comfortable trading these higher cost=
s for increased adoption due to the simplicity.<br>
<br>-- Fixed costs for smaller providers<br><br>There is a fixed cost to ob=
taining and signing an SSL certificates, although that has dropped in recen=
t years such that an operator can have a cert signed for a single domain fo=
r pretty cheap.<br>
<br>-- Latency<br><br>SSL connections take more time to establish than norm=
al HTTP connections. Servers can use specialized hardware to speed it up, b=
ut clients rarely do, which means that for client-to-server API requests, t=
here may be some higher latency in each request. Smaller, mobile devices ma=
y be disproportionately affected by this, but as they grow more powerful it=
=92s less of a concern. Already today newer phones can handle SSL just fine=
.<br>
<br>-- Browser limitations for cross domain communication<br><br>A more nic=
he disadvantage is that some cross domain communication techniques require =
the protocol of the parent page to match that of the endpoint being queried=
. So for example, in some browsers, for some API calls, it would be impossi=
ble to make an API call to an HTTPS endpoint from a normal HTTP page. Howev=
er, as browsers advance and HTML5 methods like postMessage become more comm=
on, this will become less of an issue.<br>
<br>-- Verifying information on the relying party<br><br>If information is =
passed from a Service Provider to a Consumer through the user=92s browser, =
then that information cannot be verified without an API call, unless a sign=
ature is provided. Similar to stateful vs. stateless mode in the OpenID 2.0=
 spec, the signature can serve as a performance enhancement to avoid an API=
 call.<br>
<br>=3D=3D Providing a non-SSL option for the short head<br><br>Most platfo=
rms tend to have a small number of fairly large developers and then a reall=
y large number of smaller developers. The former are typically experienced =
(or at least, they are by the time they get big) and have made a large inve=
stment in the platform. The latter range from experienced developers to ama=
teurs to folks that would not typically program. For this spec to be succes=
sful, it must meet the needs of both groups.<br>
<br>Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever bec=
ause we want to help our long tail developers use our platform more easily.=
 For the long tail, the simplicity provided by SSL will be crucial. It mean=
s smaller or nonexistent client libaries, it means that developers can just=
 try out the API by typing it into a web browser, and it will help reduce d=
ebugging and maintenance costs.<br>
<br>However, for the short head of high volume developers, we probably want=
 an option to use something other than SSL to make secure requests. These d=
evelopers tend to have already solved the low hanging performance fruit, an=
d for them it may be a significant penalty to pay the SSL connection cost o=
n every request. To that end, I think it=92s pretty important that OAuth 2.=
0 support a method other than SSL as an option for advanced developers. But=
 it should be just that =96 an option, and only for advanced developers, so=
 that beginning programmers and folks learning an API don=92t need to worry=
 about signatures when they just want to play around.<br>
<br>Please let me know if I=92m missing something or if my assumptions soun=
d incorrect.<br><br>-Luke Shepard<br>Software Engineer, Facebook Platform</=
span></p></div></div></div></div></div><br>________________________________=
_______________<br>

OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br>

--00504502f681b8b7a6047e47cf02--

From recordond@gmail.com  Thu Jan 28 22:35:10 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 40E103A6899 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 22:35:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[AWL=-0.089,  BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_UNSUB38=0.777]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jEPTXOsgtMuK for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 22:35:09 -0800 (PST)
Received: from mail-iw0-f174.google.com (mail-iw0-f174.google.com [209.85.223.174]) by core3.amsl.com (Postfix) with ESMTP id D22233A6452 for <oauth@ietf.org>; Thu, 28 Jan 2010 22:35:08 -0800 (PST)
Received: by iwn4 with SMTP id 4so810312iwn.18 for <oauth@ietf.org>; Thu, 28 Jan 2010 22:35:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=ak05NM67GYmhmwkzITmMLS1aCHXzZCUMLi9cnbXkKm8=; b=kxpaSFh93JKqRHMbZnCnT8iumZjJx16r81+H4n1eoMLQTwuRffxq9hS8CaMcPHRycY chV3zGw+IgL8uhn9S8zbIVpDZ1jyxEqDdG3+xZwsxwnML3gqzNsrJdeO+U7svfnBz1zq zK0zF45P/jBqhRX3fF+L19Igzr2JP4mnWzGNQ=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=gss7wSjtUMTtwI9kNTj90n82pod/Zu7wBmXg+uhQt13tC0ixYwomyErn1fx3Z8oTSw kvEnlYe/JGmuqZbvEeXdpX34wbCFiG/JvKYgTP/pjEN5HO3+j7m3/sPSL9upq2op/yeH QmDF1YNWp+OoIWi7VMfguNK3/4e2deG5WDmF4=
MIME-Version: 1.0
Received: by 10.231.153.69 with SMTP id j5mr645666ibw.33.1264746927095; Thu,  28 Jan 2010 22:35:27 -0800 (PST)
In-Reply-To: <4B61AFF0.6060302@stpeter.im>
References: <4B61AFF0.6060302@stpeter.im>
Date: Thu, 28 Jan 2010 22:35:27 -0800
Message-ID: <fd6741651001282235k5ee1f5c7xfeb2d38fe867274c@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Peter Saint-Andre <stpeter@stpeter.im>, Luke Shepard <lshepard@facebook.com>
Content-Type: multipart/alternative; boundary=001636d33c7c520009047e47d744
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] terminology
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 06:35:10 -0000

--001636d33c7c520009047e47d744
Content-Type: text/plain; charset=ISO-8859-1

Hey Peter,
Luke put together a spreadsheet comparing the terminology across five or six
different protocols.  Hopefully he'll share it. :)

I have a pretty strong preference of sticking with OAuth 1.0 terminology as
much as possible.

--David

On Thu, Jan 28, 2010 at 7:40 AM, Peter Saint-Andre <stpeter@stpeter.im>wrote:

> One of the topics discussed during our conference call last week was the
> matter of terminology. All agreed that we need to gain clarity and
> consensus regarding the terms we use. To help us achieve that, I've
> created a stub wiki page:
>
> http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms
>
> If you don't yet have a wiki account, please go here:
>
> http://tools.ietf.org/newlogin
>
> Peter
>
> --
> Peter Saint-Andre
> https://stpeter.im/
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>

--001636d33c7c520009047e47d744
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

Hey Peter,<div>Luke put together a spreadsheet comparing the terminology=A0=
across=A0five or six different protocols. =A0Hopefully he&#39;ll share it. =
:)</div><div><br></div><div>I have a pretty strong preference of sticking w=
ith OAuth 1.0 terminology as much as possible.</div>
<div><br></div><div>--David<br><br><div class=3D"gmail_quote">On Thu, Jan 2=
8, 2010 at 7:40 AM, Peter Saint-Andre <span dir=3D"ltr">&lt;<a href=3D"mail=
to:stpeter@stpeter.im">stpeter@stpeter.im</a>&gt;</span> wrote:<br><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc s=
olid;padding-left:1ex;">
One of the topics discussed during our conference call last week was the<br=
>
matter of terminology. All agreed that we need to gain clarity and<br>
consensus regarding the terms we use. To help us achieve that, I&#39;ve<br>
created a stub wiki page:<br>
<br>
<a href=3D"http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms" target=
=3D"_blank">http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms</a><br=
>
<br>
If you don&#39;t yet have a wiki account, please go here:<br>
<br>
<a href=3D"http://tools.ietf.org/newlogin" target=3D"_blank">http://tools.i=
etf.org/newlogin</a><br>
<br>
Peter<br>
<font color=3D"#888888"><br>
--<br>
Peter Saint-Andre<br>
<a href=3D"https://stpeter.im/" target=3D"_blank">https://stpeter.im/</a><b=
r>
<br>
<br>
<br>
</font><br>_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><br>
<br></blockquote></div><br></div>

--001636d33c7c520009047e47d744--

From lshepard@facebook.com  Thu Jan 28 23:55:14 2010
Return-Path: <lshepard@facebook.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 282643A6813 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 23:55:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.764
X-Spam-Level: 
X-Spam-Status: No, score=-5.764 tagged_above=-999 required=5 tests=[AWL=-0.100, BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aXhHqra9nuq5 for <oauth@core3.amsl.com>; Thu, 28 Jan 2010 23:54:55 -0800 (PST)
Received: from mailout-snc1.facebook.com (mailout-snc1.facebook.com [69.63.179.25]) by core3.amsl.com (Postfix) with ESMTP id E01533A6452 for <oauth@ietf.org>; Thu, 28 Jan 2010 23:54:54 -0800 (PST)
Received: from mail.thefacebook.com ([192.168.18.83]) by pp01.snc1.tfbnw.net (8.14.3/8.14.3) with ESMTP id o0T7t0U5029125 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Thu, 28 Jan 2010 23:55:00 -0800
Received: from SC-MBXC1.TheFacebook.com ([192.168.18.100]) by sc-hub06.TheFacebook.com ([192.168.18.83]) with mapi; Thu, 28 Jan 2010 23:55:12 -0800
From: Luke Shepard <lshepard@facebook.com>
To: David Recordon <recordond@gmail.com>, Eran Hammer-Lahav <eran@hueniverse.com>
Date: Thu, 28 Jan 2010 23:55:04 -0800
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgrPOi0FTartjmRxaABHr563lNewAC2oRM
Message-ID: <C787D458.1C8E2%lshepard@facebook.com>
In-Reply-To: <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com>
Accept-Language: en-US
Content-Language: en
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_C787D4581C8E2lshepardfacebookcom_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2010-01-29_04:2010-01-20, 2010-01-29, 2010-01-29 signatures=0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 07:55:14 -0000

--_000_C787D4581C8E2lshepardfacebookcom_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Thanks Eran, this is helpful. Few thoughts:

> We have no business telling servers what they MUST implement (they might =
consider S-Plain too weak for their needs)

Of all the negatives I listed below about SSL, being insecure was not one o=
f them. I'm very interested in hearing real world use cases where you think=
 SSL will be too insecure?

> But the advantage is that I do not mandate Facebook to do anything it doe=
sn't want.

I would rather mandate that the Service Provider support something extra th=
an require it in every client.

> Any OAuth 2.0 client will work with Facebook. It is true that writing a f=
ully compliant client will require more work.

If it's more work to write libraries, then fewer libraries will be written,=
 and they will be less well maintained. My primary goal with this spec is t=
o make adoption as easy as possible and supported on as many platforms as p=
ossible. Part of the point of adopting a spec is you get to share code acro=
ss libraries. If we start by saying "you'll have a different client library=
 for each service" then doesn't that defeat the point?


On 1/28/10 10:33 PM, "David Recordon" <recordond@gmail.com> wrote:

On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav <eran@hueniverse.com> wr=
ote:
(For the sake of simplicity, I am going to refer to the Plain bearer token =
with SSL/TLS as S-Plain)
WRAP appeal is also its limitation and (strictly as written) it sacrifices =
security for client ease. We still don't know what OAuth 2.0 is (it is *not=
* WRAP, but likely to include ideas from it).
How is security sacrificed in the S-Plain method proposed for OAuth 2.0?  I=
 understand that WRAP makes sacrifices, but am I missing something in terms=
 of moving a Plain bearer token always over SSL/TLS when making authenticat=
ion requests?

The problem I have with your approach is that you are mandating server depl=
oyment and given that this is a security protocol, we have no business tell=
ing servers what they MUST implement (they might consider S-Plain too weak =
for their needs). There are many reasons why vendors would rather not use t=
he S-Plain option (you listed some of those) for every protected resource r=
equest. There are also many reasons why vendors would only support S-Plain =
and no signature option.
My proposal allows you to do everything you have asked for and your develop=
ers will have an easy life with the S-Plain option, or performance / flexib=
ility with one of the HMAC methods. But the advantage is that I do not mand=
ate Facebook to do anything it doesn't want. Any OAuth 2.0 client will work=
 with Facebook.
It is true that writing a fully compliant client will require more work. Bu=
t the whole point of the S-Plain option is that it requires *no* additional=
 library beyond having SSL/TLS available. So this is a vendor support issue=
 - if you want to enable a library-less client development, offer S-Plain. =
This again, is a vendor choice.
Yes, but the tradeoff here is that a client will have S-Plain plus two or t=
hree other algorithms.  The library size is increased, the complexity is in=
creased, and it encourages servers (like Facebook) to develop separate libr=
aries which only support the one or two methods they have chosen to use.  L=
uke and I would like to avoid creating Facebook specific client libraries. =
 (This is of course based on the assumption that the majority of implementa=
tions will adopt S-Plain.  We then envision an advanced client library whic=
h also implements HMAC SHA-256.)

Also keep in mind that the current proposal moves the algorithm choice to t=
he token request/issue phase. Each token will only work with a single algor=
ithm (which is better cryptographic hygiene). So a vendor can choose to all=
ow the client to pick the algorithm they want to you, or just tell them whi=
ch one they are going to use.

EHL



From: Luke Shepard [mailto:lshepard@facebook.com]
Sent: Thursday, January 28, 2010 6:36 PM
To: Eran Hammer-Lahav; oauth@ietf.org
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication


Thanks for the detailed reply, Eran.

I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn't want to deal with signatures, then =
they never should have to. I want to be able to write a very lightweight SS=
L-only client library that is still fully OAuth 2.0 compatible.

I think instead, the consensus should be:

 *   Support an extensible set of signature algorithms
 *   Servers required to support plaintext tokens over a secure channel (SS=
L/TLS)
 *   Servers required to support at least one or a small subset of encrypti=
on algorithms. Possible candidates include hmac-sha-1, hmac-sha-256, and rs=
assa....
 *   Clients must support at least ONE of the required encryption methods

If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant - that is, it may work with a specific vendor that a=
dvertises support for that algorithm, but it won't work with all servers. A=
s algorithms gradually change over time, client libraries can be upgraded w=
hile servers need to maintain backwards compatibility. (For example, Facebo=
ok will deprecate MD5 as its sig algorithm, but will continue to support it=
 for the clients using it in the wild)

As a concrete example of what can be written when you don't need to worry a=
bout encryption, see: http://github.com/lshepard/oauth-wrap-demo/tree/maste=
r/src/wrap.js
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.


On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com <http://eran@h=
ueniverse.com> > wrote:
Thanks Luke. This is a useful analysis.

I believe we have already reached consensus in this regard:

* Support an extensible set of signature algorithms
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)

(if these assumptions are incorrect, raise your hand now)

The specification is going to define the four methods above (and possibly m=
ore) as *must implement*. This does not mean vendors have to support all of=
 them, but that any *client* library or application claiming to be 'OAuth 2=
.0 compliant' must implement all these methods.

If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
'OAuth 2.0 compliant' because any it can interop with *any* compliant libra=
ry. However, if such a vendor produces a client library for its developers =
which only implements the methods deployed by the vendor, that library is '=
OAuth 2.0 partially compliant' (because it will not interop with *all* vend=
ors).

In practice, from Facebook's perspective, you will be able to deploy OAuth =
2.0 in a compliant way, while only implementing the methods that you find s=
uitable for your developers. It sounds like you will be using the plain met=
hod over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually =
makes things trivial for its developers, I expect Facebook to produce libra=
ries that will implement these two methods, but not others. This will be a =
'Facebook API' library that uses OAuth 2.0. It will be partially compliant =
but this only means it is only guaranteed to work with Facebook, but that i=
t does so in a fully compliant way.

EHL





From: oauth-bounces@ietf.org <http://oauth-bounces@ietf.org>  [mailto:oauth=
-bounces@ietf.org] On Behalf Of Luke Shepard
Sent: Thursday, January 28, 2010 7:30 AM
To: oauth@ietf.org <http://oauth@ietf.org>
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth commun=
ication

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth




--_000_C787D4581C8E2lshepardfacebookcom_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<HTML>
<HEAD>
<TITLE>Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth &nbs=
p;communication</TITLE>
</HEAD>
<BODY>
<FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN STYLE=3D'font-size:=
11pt'>Thanks Eran, this is helpful. Few thoughts:<BR>
<BR>
&gt; We have no business telling servers what they MUST implement (they mig=
ht consider S-Plain too weak for their needs)<BR>
<BR>
Of all the negatives I listed below about SSL, being insecure was not one o=
f them. I&#8217;m very interested in hearing real world use cases where you=
 think SSL will be too insecure?<BR>
<BR>
&gt; <FONT COLOR=3D"#1E487C">But the advantage is that I do not mandate Fac=
ebook to do anything it doesn&#8217;t want. <BR>
<BR>
</FONT>I would rather mandate that the Service Provider support something e=
xtra than require it in every client.<BR>
<BR>
&gt; <FONT COLOR=3D"#1E487C">Any OAuth 2.0 client will work with Facebook.<=
/FONT> <FONT COLOR=3D"#1E487C">It is true that writing a fully compliant cl=
ient will require more work.<BR>
</FONT><BR>
If it&#8217;s more work to write libraries, then fewer libraries will be wr=
itten, and they will be less well maintained. My primary goal with this spe=
c is to make adoption as easy as possible and supported on as many platform=
s as possible. Part of the point of adopting a spec is you get to share cod=
e across libraries. If we start by saying &#8220;you&#8217;ll have a differ=
ent client library for each service&#8221; then doesn&#8217;t that defeat t=
he point? <BR>
<BR>
<BR>
On 1/28/10 10:33 PM, &quot;David Recordon&quot; &lt;<a href=3D"recordond@gm=
ail.com">recordond@gmail.com</a>&gt; wrote:<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'>On Thu, Jan 28, 2010 at 7:10 PM, Eran Hamme=
r-Lahav &lt;<a href=3D"eran@hueniverse.com">eran@hueniverse.com</a>&gt; wro=
te:<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'><FONT COLOR=3D"#1F497D">(For the sake of si=
mplicity, I am going to refer to the Plain bearer token with SSL/TLS as S-P=
lain)<BR>
WRAP appeal is also its limitation and (strictly as written) it sacrifices =
security for client ease. We still don&#8217;t know what OAuth 2.0 is (it i=
s *<B>not</B>* WRAP, but likely to include ideas from it).<BR>
</FONT></SPAN></FONT></BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica=
, Arial"><SPAN STYLE=3D'font-size:11pt'>How is security sacrificed in the S=
-Plain method proposed for OAuth 2.0? =A0I understand that WRAP makes sacri=
fices, but am I missing something in terms of moving a Plain bearer token a=
lways over SSL/TLS when making authentication requests?<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'><FONT COLOR=3D"#1F497D">The problem I have =
with your approach is that you are mandating server deployment and given th=
at this is a security protocol, we have no business telling servers what th=
ey MUST implement (they might consider S-Plain too weak for their needs). T=
here are many reasons why vendors would rather not use the S-Plain option (=
you listed some of those) for every protected resource request. There are a=
lso many reasons why vendors would only support S-Plain and no signature op=
tion.<BR>
My proposal allows you to do everything you have asked for and your develop=
ers will have an easy life with the S-Plain option, or performance / flexib=
ility with one of the HMAC methods. But the advantage is that I do not mand=
ate Facebook to do anything it doesn&#8217;t want. Any OAuth 2.0 client wil=
l work with Facebook.<BR>
It is true that writing a fully compliant client will require more work. Bu=
t the whole point of the S-Plain option is that it requires *<B>no</B>* add=
itional library beyond having SSL/TLS available. So this is a vendor suppor=
t issue &#8211; if you want to enable a library-less client development, of=
fer S-Plain. This again, is a vendor choice.<BR>
</FONT></SPAN></FONT></BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica=
, Arial"><SPAN STYLE=3D'font-size:11pt'>Yes, but the tradeoff here is that =
a client will have S-Plain plus two or three other=A0algorithms. =A0The lib=
rary size is increased, the complexity is increased, and it encourages serv=
ers (like Facebook) to develop separate libraries which only support the on=
e or two methods they have chosen to use. =A0Luke and I would like to avoid=
 creating Facebook specific client libraries. =A0(This is of course based o=
n the assumption that the majority of implementations will adopt S-Plain. =
=A0We then envision an advanced client library which also implements HMAC S=
HA-256.)<BR>
<BR>
</SPAN></FONT><BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"=
><SPAN STYLE=3D'font-size:11pt'><FONT COLOR=3D"#1F497D">Also keep in mind t=
hat the current proposal moves the algorithm choice to the token request/is=
sue phase. Each token will only work with a single algorithm (which is bett=
er cryptographic hygiene). So a vendor can choose to allow the client to pi=
ck the algorithm they want to you, or just tell them which one they are goi=
ng to use.<BR>
=A0<BR>
EHL<BR>
=A0<BR>
=A0<BR>
</FONT><BR>
</SPAN><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:10pt'><B>From:</B> Luke Sh=
epard [<a href=3D"mailto:lshepard@facebook.com">mailto:lshepard@facebook.co=
m</a>] <BR>
<B>Sent:</B> Thursday, January 28, 2010 6:36 PM<BR>
<B>To:</B> Eran Hammer-Lahav; <a href=3D"oauth@ietf.org">oauth@ietf.org</a>=
<BR>
<B>Subject:</B> Re: [OAUTH-WG] Discussion of SSL as the primary means for O=
Auth communication<BR>
</SPAN></FONT><SPAN STYLE=3D'font-size:11pt'><BR>
=A0<BR>
Thanks for the detailed reply, Eran.<BR>
<BR>
I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn&#8217;t want to deal with signatures,=
 then they never should have to. I want to be able to write a very lightwei=
ght SSL-only client library that is still fully OAuth 2.0 compatible.<BR>
<BR>
I think instead, the consensus should be:<BR>
</SPAN></FONT><UL><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SP=
AN STYLE=3D'font-size:11pt'>Support an extensible set of signature algorith=
ms=20
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN S=
TYLE=3D'font-size:11pt'>Servers required to support plaintext tokens over a=
 secure channel (SSL/TLS)=20
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN S=
TYLE=3D'font-size:11pt'>Servers required to support at least one or a small=
 subset of encryption algorithms. Possible candidates include hmac-sha-1, h=
mac-sha-256, and rsassa....=20
</SPAN></FONT><LI><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN S=
TYLE=3D'font-size:11pt'>Clients must support at least ONE of the required e=
ncryption methods<BR>
</SPAN></FONT></UL><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial"><SPAN =
STYLE=3D'font-size:11pt'><BR>
If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant &#8211; that is, it may work with a specific vendor =
that advertises support for that algorithm, but it won&#8217;t work with al=
l servers. As algorithms gradually change over time, client libraries can b=
e upgraded while servers need to maintain backwards compatibility. (For exa=
mple, Facebook will deprecate MD5 as its sig algorithm, but will continue t=
o support it for the clients using it in the wild)<BR>
<BR>
As a concrete example of what can be written when you don&#8217;t need to w=
orry about encryption, see: <a href=3D"http://github.com/lshepard/oauth-wra=
p-demo/tree/master/src/wrap.js">http://github.com/lshepard/oauth-wrap-demo/=
tree/master/src/wrap.js</a><BR>
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.<BR>
<BR>
<BR>
On 1/28/10 1:41 PM, &quot;Eran Hammer-Lahav&quot; &lt;<a href=3D"eran@hueni=
verse.com">eran@hueniverse.com</a> &lt;<a href=3D"http://eran@hueniverse.co=
m">http://eran@hueniverse.com</a>&gt; &gt; wrote:<BR>
Thanks Luke. This is a useful analysis.<BR>
=A0<BR>
I believe we have already reached consensus in this regard:<BR>
=A0<BR>
* Support an extensible set of signature algorithms<BR>
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256<BR>
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)<BR>
=A0<BR>
(if these assumptions are incorrect, raise your hand now)<BR>
=A0<BR>
The specification is going to define the four methods above (and possibly m=
ore) as *<B>must implement</B>*. This does not mean vendors have to support=
 all of them, but that any *<B>client</B>* library or application claiming =
to be &#8216;OAuth 2.0 compliant&#8217; must implement all these methods.<B=
R>
=A0<BR>
If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
&#8216;OAuth 2.0 compliant&#8217; because any it can interop with *<B>any</=
B>* compliant library. However, if such a vendor produces a client library =
for its developers which only implements the methods deployed by the vendor=
, that library is &#8216;OAuth 2.0 partially compliant&#8217; (because it w=
ill not interop with *<B>all</B>* vendors).<BR>
=A0<BR>
In practice, from Facebook&#8217;s perspective, you will be able to deploy =
OAuth 2.0 in a compliant way, while only implementing the methods that you =
find suitable for your developers. It sounds like you will be using the pla=
in method over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook us=
ually makes things trivial for its developers, I expect Facebook to produce=
 libraries that will implement these two methods, but not others. This will=
 be a &#8216;Facebook API&#8217; library that uses OAuth 2.0. It will be pa=
rtially compliant but this only means it is only guaranteed to work with Fa=
cebook, but that it does so in a fully compliant way.<BR>
=A0<BR>
EHL<BR>
=A0<BR>
=A0<BR>
=A0<BR>
=A0<BR>
<BR>
</SPAN><FONT SIZE=3D"2"><SPAN STYLE=3D'font-size:10pt'><B>From:</B> <a href=
=3D"oauth-bounces@ietf.org">oauth-bounces@ietf.org</a> &lt;<a href=3D"http:=
//oauth-bounces@ietf.org">http://oauth-bounces@ietf.org</a>&gt; &nbsp;[<a h=
ref=3D"mailto:oauth-bounces@ietf.org">mailto:oauth-bounces@ietf.org</a>] <B=
>On Behalf Of </B>Luke Shepard<BR>
<B>Sent:</B> Thursday, January 28, 2010 7:30 AM<BR>
<B>To:</B> <a href=3D"oauth@ietf.org">oauth@ietf.org</a> &lt;<a href=3D"htt=
p://oauth@ietf.org">http://oauth@ietf.org</a>&gt; <BR>
<B>Subject:</B> [OAUTH-WG] Discussion of SSL as the primary means for OAuth=
 communication<BR>
</SPAN></FONT><SPAN STYLE=3D'font-size:11pt'><BR>
In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, &#8220;why use SSL exclusively?&#8221; Several of us have done a l=
ot of thinking on it and I wanted to articulate my understanding of the pro=
s and cons of the approach for discussion. The use case I primarily have in=
 mind is that of a web service, like Facebook, Twitter, or Google services.=
 Our service is primarily authenticated via the Web, but we have a use for =
all of the WRAP profiles (web app, client app, desktop, mobile).<BR>
=A0<BR>
Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.<BR>
<BR>
=3D=3D Advantages of using SSL for API calls<BR>
<BR>
-- It&#8217;s overwhelmingly simpler for developers.<BR>
I&#8217;ve implemented OpenID and OAuth, and I&#8217;ve worked for years wi=
th developers trying to handle signatures on the Facebook Platform. In my e=
xperience, calculating signatures is one of the most complex and difficult =
parts of an authentication protocol, and developers often get it wrong. By =
moving that piece down the stack we can get it out of their way and let dev=
elopers focus on building their apps.<BR>
<BR>
-- Existing tools ecosystem<BR>
It&#8217;s not that SSL is a simpler encryption protocol than OAuth (it&#82=
17;s not) but rather that commonly available tools almost universally suppo=
rt it &#8211; every major web browser, as well as most libraries for making=
 HTTP requests (like curl) have built-in support for SSL. For OAuth 1.0, yo=
u need to use a client library just to construct your very first request.<B=
R>
<BR>
-- Smaller client libraries<BR>
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding. <BR>
<BR>
Wouldn&#8217;t it be great if we could write a protocol that doesn&#8217;t =
even require a client library to implement? If I could just make an authent=
icated API request in my browser, as easily as with Basic Auth?<BR>
<BR>
=3D=3D Disadvantages of using SSL for API calls<BR>
<BR>
-- Difficulties of debugging<BR>
<BR>
Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can&#8217;t sniff a request, and to intercept it=
, you need an HTTP proxy that understands SSL, and you need to worry about =
invalid certificate errors. To aid in this, providers will probably offer a=
 non-SSL endpoint for debugging, but they may need to set up a sandbox envi=
ronment to prevent damage from tokens exposed in plaintext.<BR>
<BR>
-- Variable costs for providers<BR>
<BR>
Server CPU costs will increase when handling SSL requests &#8211; especiall=
y on every API call instead of just at the auth stage. At scale, this can b=
ecome expensive, although it can be offset by using specialized hardware to=
 terminate the SSL connection. All the big companies I&#8217;ve talked to a=
re comfortable trading these higher costs for increased adoption due to the=
 simplicity.<BR>
<BR>
-- Fixed costs for smaller providers<BR>
<BR>
There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.<BR>
<BR>
-- Latency<BR>
<BR>
SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it&#8217;s less of a con=
cern. Already today newer phones can handle SSL just fine.<BR>
<BR>
-- Browser limitations for cross domain communication<BR>
<BR>
A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.<BR>
<BR>
-- Verifying information on the relying party<BR>
<BR>
If information is passed from a Service Provider to a Consumer through the =
user&#8217;s browser, then that information cannot be verified without an A=
PI call, unless a signature is provided. Similar to stateful vs. stateless =
mode in the OpenID 2.0 spec, the signature can serve as a performance enhan=
cement to avoid an API call.<BR>
<BR>
=3D=3D Providing a non-SSL option for the short head<BR>
<BR>
Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.<BR>
<BR>
Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.<BR>
<BR>
However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it&#8217;s pretty important that OAuth 2.=
0 support a method other than SSL as an option for advanced developers. But=
 it should be just that &#8211; an option, and only for advanced developers=
, so that beginning programmers and folks learning an API don&#8217;t need =
to worry about signatures when they just want to play around.<BR>
<BR>
Please let me know if I&#8217;m missing something or if my assumptions soun=
d incorrect.<BR>
<BR>
-Luke Shepard<BR>
Software Engineer, Facebook Platform<BR>
<BR>
_______________________________________________<BR>
OAuth mailing list<BR>
<a href=3D"OAuth@ietf.org">OAuth@ietf.org</a><BR>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth">https://www.ietf.or=
g/mailman/listinfo/oauth</a><BR>
<BR>
</SPAN></FONT></BLOCKQUOTE><FONT FACE=3D"Calibri, Verdana, Helvetica, Arial=
"><SPAN STYLE=3D'font-size:11pt'><BR>
<BR>
</SPAN></FONT></BLOCKQUOTE>
</BODY>
</HTML>


--_000_C787D4581C8E2lshepardfacebookcom_--

From eran@hueniverse.com  Fri Jan 29 00:12:29 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 232993A6970 for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:12:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.113
X-Spam-Level: 
X-Spam-Status: No, score=-2.113 tagged_above=-999 required=5 tests=[AWL=-0.115, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aOhV8NO65Pvo for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:12:09 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id DA6C63A6852 for <oauth@ietf.org>; Fri, 29 Jan 2010 00:12:08 -0800 (PST)
Received: (qmail 28711 invoked from network); 29 Jan 2010 08:12:29 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Jan 2010 08:12:27 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 29 Jan 2010 01:12:27 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: David Recordon <recordond@gmail.com>
Date: Fri, 29 Jan 2010 01:12:21 -0700
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgrPfOGBNEmkaqSUuZKa5RikmUIAADBKBg
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D25C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <C787897C.1C8A7%lshepard@facebook.com> <90C41DD21FB7C64BB94121FBBC2E723437899D258E@P3PW5EX1MB01.EX1.SECURESERVER.NET> <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com>
In-Reply-To: <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C7P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 08:12:29 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C7P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

For one, we know never to assume that SSL is implemented correctly (not in =
terms of the libraries but how certificate exceptions are handled and how i=
ts defenses can be compromised). S-Plain also exposes the secret to interme=
diaries while signatures can pass through without being compromised. I am s=
ure Ben Laurie and others can list more differences (and hope they will).

I disagree with your second comment about client library size. Typically if=
 you have one crypto algorithm, you have many others available. And if you =
are suggesting that by requiring only S-Plain it will enable crypto-less li=
braries, I would rather the community avoided producing such limited *libra=
ries*. If we make it ok not to support signatures in generic libraries, it =
will make it even harder for vendors to offer them.

At the end, the market will decide between signatures and S-Plain, the same=
 way the RSA method in OAuth 1.0 gained very little traction (mostly becaus=
e it was underspecified IMO). I don't think we should make that decision he=
re.

EHL


From: David Recordon [mailto:recordond@gmail.com]
Sent: Thursday, January 28, 2010 10:33 PM
To: Eran Hammer-Lahav
Cc: Luke Shepard; oauth@ietf.org
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication

On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav <eran@hueniverse.com<mai=
lto:eran@hueniverse.com>> wrote:
(For the sake of simplicity, I am going to refer to the Plain bearer token =
with SSL/TLS as S-Plain)
WRAP appeal is also its limitation and (strictly as written) it sacrifices =
security for client ease. We still don't know what OAuth 2.0 is (it is *not=
* WRAP, but likely to include ideas from it).
How is security sacrificed in the S-Plain method proposed for OAuth 2.0?  I=
 understand that WRAP makes sacrifices, but am I missing something in terms=
 of moving a Plain bearer token always over SSL/TLS when making authenticat=
ion requests?

The problem I have with your approach is that you are mandating server depl=
oyment and given that this is a security protocol, we have no business tell=
ing servers what they MUST implement (they might consider S-Plain too weak =
for their needs). There are many reasons why vendors would rather not use t=
he S-Plain option (you listed some of those) for every protected resource r=
equest. There are also many reasons why vendors would only support S-Plain =
and no signature option.
My proposal allows you to do everything you have asked for and your develop=
ers will have an easy life with the S-Plain option, or performance / flexib=
ility with one of the HMAC methods. But the advantage is that I do not mand=
ate Facebook to do anything it doesn't want. Any OAuth 2.0 client will work=
 with Facebook.
It is true that writing a fully compliant client will require more work. Bu=
t the whole point of the S-Plain option is that it requires *no* additional=
 library beyond having SSL/TLS available. So this is a vendor support issue=
 - if you want to enable a library-less client development, offer S-Plain. =
This again, is a vendor choice.
Yes, but the tradeoff here is that a client will have S-Plain plus two or t=
hree other algorithms.  The library size is increased, the complexity is in=
creased, and it encourages servers (like Facebook) to develop separate libr=
aries which only support the one or two methods they have chosen to use.  L=
uke and I would like to avoid creating Facebook specific client libraries. =
 (This is of course based on the assumption that the majority of implementa=
tions will adopt S-Plain.  We then envision an advanced client library whic=
h also implements HMAC SHA-256.)

Also keep in mind that the current proposal moves the algorithm choice to t=
he token request/issue phase. Each token will only work with a single algor=
ithm (which is better cryptographic hygiene). So a vendor can choose to all=
ow the client to pick the algorithm they want to you, or just tell them whi=
ch one they are going to use.

EHL


From: Luke Shepard [mailto:lshepard@facebook.com<mailto:lshepard@facebook.c=
om>]
Sent: Thursday, January 28, 2010 6:36 PM
To: Eran Hammer-Lahav; oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication

Thanks for the detailed reply, Eran.

I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn't want to deal with signatures, then =
they never should have to. I want to be able to write a very lightweight SS=
L-only client library that is still fully OAuth 2.0 compatible.

I think instead, the consensus should be:

 *   Support an extensible set of signature algorithms
 *   Servers required to support plaintext tokens over a secure channel (SS=
L/TLS)
 *   Servers required to support at least one or a small subset of encrypti=
on algorithms. Possible candidates include hmac-sha-1, hmac-sha-256, and rs=
assa....
 *   Clients must support at least ONE of the required encryption methods

If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant - that is, it may work with a specific vendor that a=
dvertises support for that algorithm, but it won't work with all servers. A=
s algorithms gradually change over time, client libraries can be upgraded w=
hile servers need to maintain backwards compatibility. (For example, Facebo=
ok will deprecate MD5 as its sig algorithm, but will continue to support it=
 for the clients using it in the wild)

As a concrete example of what can be written when you don't need to worry a=
bout encryption, see: http://github.com/lshepard/oauth-wrap-demo/tree/maste=
r/src/wrap.js
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.


On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com<http://eran@hu=
eniverse.com>> wrote:
Thanks Luke. This is a useful analysis.

I believe we have already reached consensus in this regard:

* Support an extensible set of signature algorithms
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)

(if these assumptions are incorrect, raise your hand now)

The specification is going to define the four methods above (and possibly m=
ore) as *must implement*. This does not mean vendors have to support all of=
 them, but that any *client* library or application claiming to be 'OAuth 2=
.0 compliant' must implement all these methods.

If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
'OAuth 2.0 compliant' because any it can interop with *any* compliant libra=
ry. However, if such a vendor produces a client library for its developers =
which only implements the methods deployed by the vendor, that library is '=
OAuth 2.0 partially compliant' (because it will not interop with *all* vend=
ors).

In practice, from Facebook's perspective, you will be able to deploy OAuth =
2.0 in a compliant way, while only implementing the methods that you find s=
uitable for your developers. It sounds like you will be using the plain met=
hod over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually =
makes things trivial for its developers, I expect Facebook to produce libra=
ries that will implement these two methods, but not others. This will be a =
'Facebook API' library that uses OAuth 2.0. It will be partially compliant =
but this only means it is only guaranteed to work with Facebook, but that i=
t does so in a fully compliant way.

EHL





From: oauth-bounces@ietf.org<http://oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org] On Behalf Of Luke Shepard
Sent: Thursday, January 28, 2010 7:30 AM
To: oauth@ietf.org<http://oauth@ietf.org>
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth commun=
ication

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C7P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><meta http-equiv=3DContent-Type content=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:444158410;
	mso-list-template-ids:-374054746;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:1135954564;
	mso-list-template-ids:-126078960;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>For one, =
we know never to assume that SSL is implemented correctly (not in terms of =
the libraries but how certificate exceptions are handled and how its defens=
es can be compromised). S-Plain also exposes the secret to intermediaries w=
hile signatures can pass through without being compromised. I am sure Ben L=
aurie and others can list more differences (and hope they will).<o:p></o:p>=
</span></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family=
:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'>I disagree with your second comment about client librar=
y size. Typically if you have one crypto algorithm, you have many others av=
ailable. And if you are suggesting that by requiring only S-Plain it will e=
nable crypto-less libraries, I would rather the community avoided producing=
 such limited *<b>libraries</b>*. If we make it ok not to support signature=
s in generic libraries, it will make it even harder for vendors to offer th=
em.<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.0=
pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></spa=
n></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Cal=
ibri","sans-serif";color:#1F497D'>At the end, the market will decide betwee=
n signatures and S-Plain, the same way the RSA method in OAuth 1.0 gained v=
ery little traction (mostly because it was underspecified IMO). I don&#8217=
;t think we should make that decision here.<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.=
0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></sp=
an></p><p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Ca=
libri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><div style=
=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in 4.0pt'><di=
v><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0i=
n 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-fam=
ily:"Tahoma","sans-serif"'>From:</span></b><span style=3D'font-size:10.0pt;=
font-family:"Tahoma","sans-serif"'> David Recordon [mailto:recordond@gmail.=
com] <br><b>Sent:</b> Thursday, January 28, 2010 10:33 PM<br><b>To:</b> Era=
n Hammer-Lahav<br><b>Cc:</b> Luke Shepard; oauth@ietf.org<br><b>Subject:</b=
> Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communica=
tion<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;</o:p=
></p><p class=3DMsoNormal>On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Laha=
v &lt;<a href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt; wr=
ote:<o:p></o:p></p><div><blockquote style=3D'border:none;border-left:solid =
#CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'=
><div><div><p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin=
-bottom-alt:auto'><span style=3D'font-size:11.0pt;color:#1F497D'>(For the s=
ake of simplicity, I am going to refer to the Plain bearer token with SSL/T=
LS as S-Plain)</span><o:p></o:p></p><p class=3DMsoNormal style=3D'mso-margi=
n-top-alt:auto;mso-margin-bottom-alt:auto'><span style=3D'font-size:11.0pt;=
color:#1F497D'>WRAP appeal is also its limitation and (strictly as written)=
 it sacrifices security for client ease. We still don&#8217;t know what OAu=
th 2.0 is (it is *<b>not</b>* WRAP, but likely to include ideas from it).</=
span><o:p></o:p></p></div></div></blockquote><div><p class=3DMsoNormal>How =
is security sacrificed in the S-Plain method proposed for OAuth 2.0? &nbsp;=
I understand that WRAP makes sacrifices, but am I missing something in term=
s of moving a Plain bearer token always over SSL/TLS when making authentica=
tion requests?<o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o=
:p></p></div><blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0=
pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in'><div><div>=
<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span style=3D'font-size:11.0pt;color:#1F497D'>The problem I have wi=
th your approach is that you are mandating server deployment and given that=
 this is a security protocol, we have no business telling servers what they=
 MUST implement (they might consider S-Plain too weak for their needs). The=
re are many reasons why vendors would rather not use the S-Plain option (yo=
u listed some of those) for every protected resource request. There are als=
o many reasons why vendors would only support S-Plain and no signature opti=
on.</span><o:p></o:p></p><p class=3DMsoNormal style=3D'mso-margin-top-alt:a=
uto;mso-margin-bottom-alt:auto'><span style=3D'font-size:11.0pt;color:#1F49=
7D'>My proposal allows you to do everything you have asked for and your dev=
elopers will have an easy life with the S-Plain option, or performance / fl=
exibility with one of the HMAC methods. But the advantage is that I do not =
mandate Facebook to do anything it doesn&#8217;t want. Any OAuth 2.0 client=
 will work with Facebook.</span><o:p></o:p></p><p class=3DMsoNormal style=
=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span style=3D'font=
-size:11.0pt;color:#1F497D'>It is true that writing a fully compliant clien=
t will require more work. But the whole point of the S-Plain option is that=
 it requires *<b>no</b>* additional library beyond having SSL/TLS available=
. So this is a vendor support issue &#8211; if you want to enable a library=
-less client development, offer S-Plain. This again, is a vendor choice.</s=
pan><o:p></o:p></p></div></div></blockquote><div><p class=3DMsoNormal>Yes, =
but the tradeoff here is that a client will have S-Plain plus two or three =
other&nbsp;algorithms. &nbsp;The library size is increased, the complexity =
is increased, and it encourages servers (like Facebook) to develop separate=
 libraries which only support the one or two methods they have chosen to us=
e. &nbsp;Luke and I would like to avoid creating Facebook specific client l=
ibraries. &nbsp;(This is of course based on the assumption that the majorit=
y of implementations will adopt S-Plain. &nbsp;We then envision an advanced=
 client library which also implements HMAC SHA-256.)<o:p></o:p></p></div><d=
iv><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><blockquote style=3D'bor=
der:none;border-left:solid #CCCCCC 1.0pt;padding:0in 0in 0in 6.0pt;margin-l=
eft:4.8pt;margin-right:0in'><div><div><p class=3DMsoNormal style=3D'mso-mar=
gin-top-alt:auto;mso-margin-bottom-alt:auto'><span style=3D'font-size:11.0p=
t;color:#1F497D'>Also keep in mind that the current proposal moves the algo=
rithm choice to the token request/issue phase. Each token will only work wi=
th a single algorithm (which is better cryptographic hygiene). So a vendor =
can choose to allow the client to pick the algorithm they want to you, or j=
ust tell them which one they are going to use.</span><o:p></o:p></p><p clas=
s=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>=
<span style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><o:p></o:p></p>=
<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span style=3D'font-size:11.0pt;color:#1F497D'>EHL</span><o:p></o:p>=
</p><p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom=
-alt:auto'><span style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><o:p=
></o:p></p><p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin=
-bottom-alt:auto'><span style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</sp=
an><o:p></o:p></p><div style=3D'border:none;border-left:solid blue 1.5pt;pa=
dding:0in 0in 0in 4.0pt'><div><div style=3D'border:none;border-top:solid #B=
5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal style=3D'mso-ma=
rgin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span style=3D'font-size:1=
0.0pt'>From:</span></b><span style=3D'font-size:10.0pt'> Luke Shepard [mail=
to:<a href=3D"mailto:lshepard@facebook.com" target=3D"_blank">lshepard@face=
book.com</a>] <br><b>Sent:</b> Thursday, January 28, 2010 6:36 PM<br><b>To:=
</b> Eran Hammer-Lahav; <a href=3D"mailto:oauth@ietf.org" target=3D"_blank"=
>oauth@ietf.org</a><br><b>Subject:</b> Re: [OAUTH-WG] Discussion of SSL as =
the primary means for OAuth communication</span><o:p></o:p></p></div></div>=
<div><div><p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-=
bottom-alt:auto'>&nbsp;<o:p></o:p></p><p class=3DMsoNormal style=3D'mso-mar=
gin-top-alt:auto;margin-bottom:12.0pt'><span style=3D'font-size:11.0pt'>Tha=
nks for the detailed reply, Eran.<br><br>I think that your proposed design =
has it backwards: servers should bear complexity and one-time costs, not cl=
ients. Much of why I think OAuth WRAP / 2.0 is so appealing is that it dram=
atically simplifies life for developers. If a client can support SSL and do=
esn&#8217;t want to deal with signatures, then they never should have to. I=
 want to be able to write a very lightweight SSL-only client library that i=
s still fully OAuth 2.0 compatible.<br><br>I think instead, the consensus s=
hould be:</span><o:p></o:p></p><ul type=3Ddisc><li class=3DMsoNormal style=
=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 l=
fo2'><span style=3D'font-size:11.0pt'>Support an extensible set of signatur=
e algorithms </span><o:p></o:p></li><li class=3DMsoNormal style=3D'mso-marg=
in-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level1 lfo2'><span s=
tyle=3D'font-size:11.0pt'>Servers required to support plaintext tokens over=
 a secure channel (SSL/TLS) </span><o:p></o:p></li><li class=3DMsoNormal st=
yle=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-list:l0 level=
1 lfo2'><span style=3D'font-size:11.0pt'>Servers required to support at lea=
st one or a small subset of encryption algorithms. Possible candidates incl=
ude hmac-sha-1, hmac-sha-256, and rsassa.... </span><o:p></o:p></li><li cla=
ss=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;=
mso-list:l0 level1 lfo2'><span style=3D'font-size:11.0pt'>Clients must supp=
ort at least ONE of the required encryption methods</span><o:p></o:p></li><=
/ul><p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;margin-bottom:12.=
0pt'><span style=3D'font-size:11.0pt'><br>If a client supports at least one=
 of the required methods (SSL or one of the algorithms), then it can be con=
sidered fully OAuth 2.0 compliant. If it only supports encryption methods t=
hat are not in the required list, then it is partially compliant &#8211; th=
at is, it may work with a specific vendor that advertises support for that =
algorithm, but it won&#8217;t work with all servers. As algorithms graduall=
y change over time, client libraries can be upgraded while servers need to =
maintain backwards compatibility. (For example, Facebook will deprecate MD5=
 as its sig algorithm, but will continue to support it for the clients usin=
g it in the wild)<br><br>As a concrete example of what can be written when =
you don&#8217;t need to worry about encryption, see: <a href=3D"http://gith=
ub.com/lshepard/oauth-wrap-demo/tree/master/src/wrap.js" target=3D"_blank">=
http://github.com/lshepard/oauth-wrap-demo/tree/master/src/wrap.js</a><br>I=
f I were to modify that JS to accommodate multiple signature algorithms, th=
en I would need to include at least another 1-2k of JavaScript for each met=
hod just in case. That would be fairly ridiculous.<br><br><br>On 1/28/10 1:=
41 PM, &quot;Eran Hammer-Lahav&quot; &lt;<a href=3D"http://eran@hueniverse.=
com" target=3D"_blank">eran@hueniverse.com</a>&gt; wrote:</span><o:p></o:p>=
</p><p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;margin-bottom:12.=
0pt'><span style=3D'font-size:11.0pt'>Thanks Luke. This is a useful analysi=
s.<br>&nbsp;<br>I believe we have already reached consensus in this regard:=
<br>&nbsp;<br>* Support an extensible set of signature algorithms<br>* Defi=
ne hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256<br>* Define a pl=
ain method for bearer tokens and either require SSL/TLS or strongly recomme=
nd it (open issue)<br>&nbsp;<br>(if these assumptions are incorrect, raise =
your hand now)<br>&nbsp;<br>The specification is going to define the four m=
ethods above (and possibly more) as *<b>must implement</b>*. This does not =
mean vendors have to support all of them, but that any *<b>client</b>* libr=
ary or application claiming to be &#8216;OAuth 2.0 compliant&#8217; must im=
plement all these methods.<br>&nbsp;<br>If a vendor issues tokens not using=
 all these methods (which is more likely), it does not have to implement al=
l these methods and can still be called &#8216;OAuth 2.0 compliant&#8217; b=
ecause any it can interop with *<b>any</b>* compliant library. However, if =
such a vendor produces a client library for its developers which only imple=
ments the methods deployed by the vendor, that library is &#8216;OAuth 2.0 =
partially compliant&#8217; (because it will not interop with *<b>all</b>* v=
endors).<br>&nbsp;<br>In practice, from Facebook&#8217;s perspective, you w=
ill be able to deploy OAuth 2.0 in a compliant way, while only implementing=
 the methods that you find suitable for your developers. It sounds like you=
 will be using the plain method over SSL and either hmac-sha-1 or hmac-sha-=
256. Since Facebook usually makes things trivial for its developers, I expe=
ct Facebook to produce libraries that will implement these two methods, but=
 not others. This will be a &#8216;Facebook API&#8217; library that uses OA=
uth 2.0. It will be partially compliant but this only means it is only guar=
anteed to work with Facebook, but that it does so in a fully compliant way.=
<br>&nbsp;<br>EHL<br>&nbsp;<br>&nbsp;<br>&nbsp;<br>&nbsp;<br><br></span><b>=
<span style=3D'font-size:10.0pt'>From:</span></b><span style=3D'font-size:1=
0.0pt'> <a href=3D"http://oauth-bounces@ietf.org" target=3D"_blank">oauth-b=
ounces@ietf.org</a> [<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_b=
lank">mailto:oauth-bounces@ietf.org</a>] <b>On Behalf Of </b>Luke Shepard<b=
r><b>Sent:</b> Thursday, January 28, 2010 7:30 AM<br><b>To:</b> <a href=3D"=
http://oauth@ietf.org" target=3D"_blank">oauth@ietf.org</a><br><b>Subject:<=
/b> [OAUTH-WG] Discussion of SSL as the primary means for OAuth communicati=
on<br></span><br><span style=3D'font-size:11.0pt'>In the discussions around=
 the OAuth WRAP spec, one of the questions often asked is, &#8220;why use S=
SL exclusively?&#8221; Several of us have done a lot of thinking on it and =
I wanted to articulate my understanding of the pros and cons of the approac=
h for discussion. The use case I primarily have in mind is that of a web se=
rvice, like Facebook, Twitter, or Google services. Our service is primarily=
 authenticated via the Web, but we have a use for all of the WRAP profiles =
(web app, client app, desktop, mobile).<br>&nbsp;<br>Overall, I think that =
the simplicity of using SSL outweighs all the associated costs for most dev=
elopers. However, we should offer plaintext signatures as an optional perfo=
rmance enhancement for advanced developers.<br><br>=3D=3D Advantages of usi=
ng SSL for API calls<br><br>-- It&#8217;s overwhelmingly simpler for develo=
pers.<br>I&#8217;ve implemented OpenID and OAuth, and I&#8217;ve worked for=
 years with developers trying to handle signatures on the Facebook Platform=
. In my experience, calculating signatures is one of the most complex and d=
ifficult parts of an authentication protocol, and developers often get it w=
rong. By moving that piece down the stack we can get it out of their way an=
d let developers focus on building their apps.<br><br>-- Existing tools eco=
system<br>It&#8217;s not that SSL is a simpler encryption protocol than OAu=
th (it&#8217;s not) but rather that commonly available tools almost univers=
ally support it &#8211; every major web browser, as well as most libraries =
for making HTTP requests (like curl) have built-in support for SSL. For OAu=
th 1.0, you need to use a client library just to construct your very first =
request.<br><br>-- Smaller client libraries<br>A good chunk of code in many=
 client libraries is devoted to calculating and verifying signatures. For e=
xample, the OpenID PHP library imports several BigMath modules and encrypti=
on schemes. Even the relatively simpler Facebook client library requires se=
veral functions to sign requests. This makes the client libraries a black b=
ox and impedes understanding. <br><br>Wouldn&#8217;t it be great if we coul=
d write a protocol that doesn&#8217;t even require a client library to impl=
ement? If I could just make an authenticated API request in my browser, as =
easily as with Basic Auth?<br><br>=3D=3D Disadvantages of using SSL for API=
 calls<br><br>-- Difficulties of debugging<br><br>Both signatures and SSL p=
resent difficulties in debugging, but they tend to be different. While with=
 signatures you worry about composing the arguments wrong or using the wron=
g algorithm, with SSL you worry about reading the request over the wire. Yo=
u can&#8217;t sniff a request, and to intercept it, you need an HTTP proxy =
that understands SSL, and you need to worry about invalid certificate error=
s. To aid in this, providers will probably offer a non-SSL endpoint for deb=
ugging, but they may need to set up a sandbox environment to prevent damage=
 from tokens exposed in plaintext.<br><br>-- Variable costs for providers<b=
r><br>Server CPU costs will increase when handling SSL requests &#8211; esp=
ecially on every API call instead of just at the auth stage. At scale, this=
 can become expensive, although it can be offset by using specialized hardw=
are to terminate the SSL connection. All the big companies I&#8217;ve talke=
d to are comfortable trading these higher costs for increased adoption due =
to the simplicity.<br><br>-- Fixed costs for smaller providers<br><br>There=
 is a fixed cost to obtaining and signing an SSL certificates, although tha=
t has dropped in recent years such that an operator can have a cert signed =
for a single domain for pretty cheap.<br><br>-- Latency<br><br>SSL connecti=
ons take more time to establish than normal HTTP connections. Servers can u=
se specialized hardware to speed it up, but clients rarely do, which means =
that for client-to-server API requests, there may be some higher latency in=
 each request. Smaller, mobile devices may be disproportionately affected b=
y this, but as they grow more powerful it&#8217;s less of a concern. Alread=
y today newer phones can handle SSL just fine.<br><br>-- Browser limitation=
s for cross domain communication<br><br>A more niche disadvantage is that s=
ome cross domain communication techniques require the protocol of the paren=
t page to match that of the endpoint being queried. So for example, in some=
 browsers, for some API calls, it would be impossible to make an API call t=
o an HTTPS endpoint from a normal HTTP page. However, as browsers advance a=
nd HTML5 methods like postMessage become more common, this will become less=
 of an issue.<br><br>-- Verifying information on the relying party<br><br>I=
f information is passed from a Service Provider to a Consumer through the u=
ser&#8217;s browser, then that information cannot be verified without an AP=
I call, unless a signature is provided. Similar to stateful vs. stateless m=
ode in the OpenID 2.0 spec, the signature can serve as a performance enhanc=
ement to avoid an API call.<br><br>=3D=3D Providing a non-SSL option for th=
e short head<br><br>Most platforms tend to have a small number of fairly la=
rge developers and then a really large number of smaller developers. The fo=
rmer are typically experienced (or at least, they are by the time they get =
big) and have made a large investment in the platform. The latter range fro=
m experienced developers to amateurs to folks that would not typically prog=
ram. For this spec to be successful, it must meet the needs of both groups.=
<br><br>Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever=
 because we want to help our long tail developers use our platform more eas=
ily. For the long tail, the simplicity provided by SSL will be crucial. It =
means smaller or nonexistent client libaries, it means that developers can =
just try out the API by typing it into a web browser, and it will help redu=
ce debugging and maintenance costs.<br><br>However, for the short head of h=
igh volume developers, we probably want an option to use something other th=
an SSL to make secure requests. These developers tend to have already solve=
d the low hanging performance fruit, and for them it may be a significant p=
enalty to pay the SSL connection cost on every request. To that end, I thin=
k it&#8217;s pretty important that OAuth 2.0 support a method other than SS=
L as an option for advanced developers. But it should be just that &#8211; =
an option, and only for advanced developers, so that beginning programmers =
and folks learning an API don&#8217;t need to worry about signatures when t=
hey just want to play around.<br><br>Please let me know if I&#8217;m missin=
g something or if my assumptions sound incorrect.<br><br>-Luke Shepard<br>S=
oftware Engineer, Facebook Platform</span><o:p></o:p></p></div></div></div>=
</div></div><p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>_______=
________________________________________<br>OAuth mailing list<br><a href=
=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br><a href=3D"https://www.iet=
f.org/mailman/listinfo/oauth" target=3D"_blank">https://www.ietf.org/mailma=
n/listinfo/oauth</a><o:p></o:p></p></blockquote></div><p class=3DMsoNormal>=
<o:p>&nbsp;</o:p></p></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C7P3PW5EX1MB01E_--

From eran@hueniverse.com  Fri Jan 29 00:13:04 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2B58F3A695A for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:13:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.017
X-Spam-Level: 
X-Spam-Status: No, score=-2.017 tagged_above=-999 required=5 tests=[AWL=-0.196, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_UNSUB38=0.777]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0WFP6nlj5KuL for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:13:00 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id D89F73A6852 for <oauth@ietf.org>; Fri, 29 Jan 2010 00:12:59 -0800 (PST)
Received: (qmail 29421 invoked from network); 29 Jan 2010 08:13:21 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Jan 2010 08:13:20 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 29 Jan 2010 01:13:17 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: David Recordon <recordond@gmail.com>, Peter Saint-Andre <stpeter@stpeter.im>, Luke Shepard <lshepard@facebook.com>
Date: Fri, 29 Jan 2010 01:13:15 -0700
Thread-Topic: [OAUTH-WG] terminology
Thread-Index: AcqgrURHUZ9YBmcuRW6W2yH2ykLpnQADZDGw
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D25C8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4B61AFF0.6060302@stpeter.im> <fd6741651001282235k5ee1f5c7xfeb2d38fe867274c@mail.gmail.com>
In-Reply-To: <fd6741651001282235k5ee1f5c7xfeb2d38fe867274c@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C8P3PW5EX1MB01E_"
MIME-Version: 1.0
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] terminology
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 08:13:04 -0000

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C8P3PW5EX1MB01E_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hopefully by 1.0 you mean draft-hammer-oauth, not the community edition wit=
h its "Consumer Key" and other inventions.

EHL

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of D=
avid Recordon
Sent: Thursday, January 28, 2010 10:35 PM
To: Peter Saint-Andre; Luke Shepard
Cc: OAuth WG
Subject: Re: [OAUTH-WG] terminology

Hey Peter,
Luke put together a spreadsheet comparing the terminology across five or si=
x different protocols.  Hopefully he'll share it. :)

I have a pretty strong preference of sticking with OAuth 1.0 terminology as=
 much as possible.

--David
On Thu, Jan 28, 2010 at 7:40 AM, Peter Saint-Andre <stpeter@stpeter.im<mail=
to:stpeter@stpeter.im>> wrote:
One of the topics discussed during our conference call last week was the
matter of terminology. All agreed that we need to gain clarity and
consensus regarding the terms we use. To help us achieve that, I've
created a stub wiki page:

http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms

If you don't yet have a wiki account, please go here:

http://tools.ietf.org/newlogin

Peter

--
Peter Saint-Andre
https://stpeter.im/




_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C8P3PW5EX1MB01E_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:444158410;
	mso-list-template-ids:-374054746;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:1135954564;
	mso-list-template-ids:-126078960;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2
	{mso-list-id:1400666832;
	mso-list-template-ids:-1701146668;}
@list l2:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l2:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l2:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l2:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span style=3D'f=
ont-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'>Hopefully=
 by 1.0 you mean draft-hammer-oauth, not the community edition with its &#8=
220;Consumer Key&#8221; and other inventions.<o:p></o:p></span></p><p class=
=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri","sans-se=
rif";color:#1F497D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497D'=
>EHL<o:p></o:p></span></p><p class=3DMsoNormal><span style=3D'font-size:11.=
0pt;font-family:"Calibri","sans-serif";color:#1F497D'><o:p>&nbsp;</o:p></sp=
an></p><div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0=
in 0in 4.0pt'><div><div style=3D'border:none;border-top:solid #B5C4DF 1.0pt=
;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span style=3D'font-siz=
e:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span></b><span style=3D'=
font-size:10.0pt;font-family:"Tahoma","sans-serif"'> oauth-bounces@ietf.org=
 [mailto:oauth-bounces@ietf.org] <b>On Behalf Of </b>David Recordon<br><b>S=
ent:</b> Thursday, January 28, 2010 10:35 PM<br><b>To:</b> Peter Saint-Andr=
e; Luke Shepard<br><b>Cc:</b> OAuth WG<br><b>Subject:</b> Re: [OAUTH-WG] te=
rminology<o:p></o:p></span></p></div></div><p class=3DMsoNormal><o:p>&nbsp;=
</o:p></p><p class=3DMsoNormal>Hey Peter,<o:p></o:p></p><div><p class=3DMso=
Normal>Luke put together a spreadsheet comparing the terminology&nbsp;acros=
s&nbsp;five or six different protocols. &nbsp;Hopefully he'll share it. :)<=
o:p></o:p></p></div><div><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><d=
iv><p class=3DMsoNormal>I have a pretty strong preference of sticking with =
OAuth 1.0 terminology as much as possible.<o:p></o:p></p></div><div><p clas=
s=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal style=3D=
'margin-bottom:12.0pt'>--David<o:p></o:p></p><div><p class=3DMsoNormal>On T=
hu, Jan 28, 2010 at 7:40 AM, Peter Saint-Andre &lt;<a href=3D"mailto:stpete=
r@stpeter.im">stpeter@stpeter.im</a>&gt; wrote:<o:p></o:p></p><p class=3DMs=
oNormal style=3D'margin-bottom:12.0pt'>One of the topics discussed during o=
ur conference call last week was the<br>matter of terminology. All agreed t=
hat we need to gain clarity and<br>consensus regarding the terms we use. To=
 help us achieve that, I've<br>created a stub wiki page:<br><br><a href=3D"=
http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms" target=3D"_blank"=
>http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms</a><br><br>If you=
 don't yet have a wiki account, please go here:<br><br><a href=3D"http://to=
ols.ietf.org/newlogin" target=3D"_blank">http://tools.ietf.org/newlogin</a>=
<br><br>Peter<br><span style=3D'color:#888888'><br>--<br>Peter Saint-Andre<=
br><a href=3D"https://stpeter.im/" target=3D"_blank">https://stpeter.im/</a=
><br><br><br><br></span><br>_______________________________________________=
<br>OAuth mailing list<br><a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org<=
/a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_b=
lank">https://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p></div><=
p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>=

--_000_90C41DD21FB7C64BB94121FBBC2E723437899D25C8P3PW5EX1MB01E_--

From recordond@gmail.com  Fri Jan 29 00:38:58 2010
Return-Path: <recordond@gmail.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 31EE03A67EA for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:38:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.88
X-Spam-Level: 
X-Spam-Status: No, score=-1.88 tagged_above=-999 required=5 tests=[AWL=-0.059,  BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_UNSUB38=0.777]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7OoEx3IuRLJb for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:38:57 -0800 (PST)
Received: from mail-iw0-f184.google.com (mail-iw0-f184.google.com [209.85.223.184]) by core3.amsl.com (Postfix) with ESMTP id F40393A6966 for <oauth@ietf.org>; Fri, 29 Jan 2010 00:38:56 -0800 (PST)
Received: by iwn14 with SMTP id 14so1638102iwn.17 for <oauth@ietf.org>; Fri, 29 Jan 2010 00:39:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:in-reply-to:references :date:message-id:subject:from:to:cc:content-type; bh=lDKhQQPOP1L04YOFmvpHepvxtoN6pZQq7ZHJQBvEsYM=; b=U1rI/zCrVyPqSyQT90TbwRN0kUxa6m9cPEIc2Ex2mxZ2Hiufh3o4Cm3XHRVos3bXKi Fh99G8FZphzzo+9RNpTwmgIuob4z+PHGUqJosPWjklx8cNBGaQITuGvicJr1BmSx0TL4 O6vfJZVEjY0+FOZi4V7/woxyftYq1GxiRQzUU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=QUZBk9iv72JDGChCiV/g6V81xLR6kpEe4jnBJ4h7rcR1N440wx2mkevC3B5q634j1g jwvx/8zoPbfgNodxi4HxaeSQ8BNv6aM9TSEY9L5YeIE2eRrVKPkl6Rd4SLiCM36XyY/y jXf+qfltE01E8eygripdxfXrv7nGJAkbDyOJs=
MIME-Version: 1.0
Received: by 10.231.158.21 with SMTP id d21mr580974ibx.61.1264754355625; Fri,  29 Jan 2010 00:39:15 -0800 (PST)
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D25C8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <4B61AFF0.6060302@stpeter.im> <fd6741651001282235k5ee1f5c7xfeb2d38fe867274c@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723437899D25C8@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Date: Fri, 29 Jan 2010 00:39:15 -0800
Message-ID: <fd6741651001290039u2f863119o821319c5e6202f55@mail.gmail.com>
From: David Recordon <recordond@gmail.com>
To: Eran Hammer-Lahav <eran@hueniverse.com>
Content-Type: multipart/alternative; boundary=005045015a061860fc047e499235
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] terminology
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 08:38:58 -0000

--005045015a061860fc047e499235
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Of course. :)

On Fri, Jan 29, 2010 at 12:13 AM, Eran Hammer-Lahav <eran@hueniverse.com>wr=
ote:

> Hopefully by 1.0 you mean draft-hammer-oauth, not the community edition
> with its =93Consumer Key=94 and other inventions.
>
>
>
> EHL
>
>
>
> *From:* oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] *On Behalf
> Of *David Recordon
> *Sent:* Thursday, January 28, 2010 10:35 PM
> *To:* Peter Saint-Andre; Luke Shepard
> *Cc:* OAuth WG
> *Subject:* Re: [OAUTH-WG] terminology
>
>
>
> Hey Peter,
>
> Luke put together a spreadsheet comparing the terminology across five or
> six different protocols.  Hopefully he'll share it. :)
>
>
>
> I have a pretty strong preference of sticking with OAuth 1.0 terminology =
as
> much as possible.
>
>
>
> --David
>
> On Thu, Jan 28, 2010 at 7:40 AM, Peter Saint-Andre <stpeter@stpeter.im>
> wrote:
>
> One of the topics discussed during our conference call last week was the
> matter of terminology. All agreed that we need to gain clarity and
> consensus regarding the terms we use. To help us achieve that, I've
> created a stub wiki page:
>
> http://trac.tools.ietf.org/wg/oauth/trac/wiki/OauthTerms
>
> If you don't yet have a wiki account, please go here:
>
> http://tools.ietf.org/newlogin
>
> Peter
>
> --
> Peter Saint-Andre
> https://stpeter.im/
>
>
>
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth
>
>
>

--005045015a061860fc047e499235
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

Of course. :)<br><br><div class=3D"gmail_quote">On Fri, Jan 29, 2010 at 12:=
13 AM, Eran Hammer-Lahav <span dir=3D"ltr">&lt;<a href=3D"mailto:eran@hueni=
verse.com">eran@hueniverse.com</a>&gt;</span> wrote:<br><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex;">
<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple"><div><p class=3D"MsoNorm=
al"><span style=3D"font-size:11.0pt;color:#1F497D">Hopefully by 1.0 you mea=
n draft-hammer-oauth, not the community edition with its =93Consumer Key=94=
 and other inventions.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F497D">=A0</=
span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;color:#1F49=
7D">EHL</span></p><p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;co=
lor:#1F497D">=A0</span></p>
<div style=3D"border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt"><div><div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;paddin=
g:3.0pt 0in 0in 0in"><p class=3D"MsoNormal"><b><span style=3D"font-size:10.=
0pt">From:</span></b><span style=3D"font-size:10.0pt"> <a href=3D"mailto:oa=
uth-bounces@ietf.org" target=3D"_blank">oauth-bounces@ietf.org</a> [mailto:=
<a href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">oauth-bounces@i=
etf.org</a>] <b>On Behalf Of </b>David Recordon<br>
<b>Sent:</b> Thursday, January 28, 2010 10:35 PM<br><b>To:</b> Peter Saint-=
Andre; Luke Shepard<br><b>Cc:</b> OAuth WG<br><b>Subject:</b> Re: [OAUTH-WG=
] terminology</span></p></div></div><div><div></div><div class=3D"h5"><p cl=
ass=3D"MsoNormal">
=A0</p><p class=3D"MsoNormal">Hey Peter,</p><div><p class=3D"MsoNormal">Luk=
e put together a spreadsheet comparing the terminology=A0across=A0five or s=
ix different protocols. =A0Hopefully he&#39;ll share it. :)</p></div><div><=
p class=3D"MsoNormal">
=A0</p></div><div><p class=3D"MsoNormal">I have a pretty strong preference =
of sticking with OAuth 1.0 terminology as much as possible.</p></div><div><=
p class=3D"MsoNormal">=A0</p></div><div><p class=3D"MsoNormal" style=3D"mar=
gin-bottom:12.0pt">
--David</p><div><p class=3D"MsoNormal">On Thu, Jan 28, 2010 at 7:40 AM, Pet=
er Saint-Andre &lt;<a href=3D"mailto:stpeter@stpeter.im" target=3D"_blank">=
stpeter@stpeter.im</a>&gt; wrote:</p><p class=3D"MsoNormal" style=3D"margin=
-bottom:12.0pt">
One of the topics discussed during our conference call last week was the<br=
>matter of terminology. All agreed that we need to gain clarity and<br>cons=
ensus regarding the terms we use. To help us achieve that, I&#39;ve<br>
created a stub wiki page:<br><br><a href=3D"http://trac.tools.ietf.org/wg/o=
auth/trac/wiki/OauthTerms" target=3D"_blank">http://trac.tools.ietf.org/wg/=
oauth/trac/wiki/OauthTerms</a><br><br>If you don&#39;t yet have a wiki acco=
unt, please go here:<br>
<br><a href=3D"http://tools.ietf.org/newlogin" target=3D"_blank">http://too=
ls.ietf.org/newlogin</a><br><br>Peter<br><span style=3D"color:#888888"><br>=
--<br>Peter Saint-Andre<br><a href=3D"https://stpeter.im/" target=3D"_blank=
">https://stpeter.im/</a><br>
<br><br><br></span><br>_______________________________________________<br>O=
Auth mailing list<br><a href=3D"mailto:OAuth@ietf.org" target=3D"_blank">OA=
uth@ietf.org</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/oauth"=
 target=3D"_blank">https://www.ietf.org/mailman/listinfo/oauth</a></p>
</div><p class=3D"MsoNormal">=A0</p></div></div></div></div></div></div></b=
lockquote></div><br>

--005045015a061860fc047e499235--

From eran@hueniverse.com  Fri Jan 29 00:42:58 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6094628C125 for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:42:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.393
X-Spam-Level: 
X-Spam-Status: No, score=-2.393 tagged_above=-999 required=5 tests=[AWL=0.207,  BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hfme1PZm+r3m for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 00:42:56 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 2EA4128C132 for <oauth@ietf.org>; Fri, 29 Jan 2010 00:42:56 -0800 (PST)
Received: (qmail 21273 invoked from network); 29 Jan 2010 08:43:16 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.21) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Jan 2010 08:43:16 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.19]) by P3PW5EX1HT003.EX1.SECURESERVER.NET ([72.167.180.21]) with mapi; Fri, 29 Jan 2010 01:43:13 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: Luke Shepard <lshepard@facebook.com>, David Recordon <recordond@gmail.com>
Date: Fri, 29 Jan 2010 01:43:11 -0700
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgrPOi0FTartjmRxaABHr563lNewAC2oRMAADHEsA=
Message-ID: <90C41DD21FB7C64BB94121FBBC2E723437899D25CF@P3PW5EX1MB01.EX1.SECURESERVER.NET>
References: <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com> <C787D458.1C8E2%lshepard@facebook.com>
In-Reply-To: <C787D458.1C8E2%lshepard@facebook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 08:42:58 -0000

> -----Original Message-----
> From: Luke Shepard [mailto:lshepard@facebook.com]
> Sent: Thursday, January 28, 2010 11:55 PM

> > We have no business telling servers what they MUST implement (they
> > might consider S-Plain too weak for their needs)
>
> Of all the negatives I listed below about SSL, being insecure was not one=
 of
> them. I'm very interested in hearing real world use cases where you think
> SSL will be too insecure?

Having to go through intermediaries is one.

You are also limiting your review to symmetric secrets in which there is li=
ttle difference between sending the secret or using it to sign something (a=
ssuming the secret remains secret and you prevent MITM). But using asymmetr=
ic secrets to sign requests offers more protections such as preventing the =
server from being able to imitate the client.

It also doesn't need to be insecure, just not acceptable in the environment=
 it is deployed. For example, it can be wasteful over a VPN connection or i=
llegal in some countries.

> > But the advantage is that I do not mandate Facebook to do anything it
> doesn't want.
>
> I would rather mandate that the Service Provider support something extra
> than require it in every client.

But it goes much beyond 'supporting something extra'. Either S-Plain is goo=
d enough for everything or it's not. If it is, we should just mandate it an=
d forget about the rest. But as your analysis clearly shows, there are case=
s where it is not appropriate. What if I have a service with only large API=
 clients?

> > Any OAuth 2.0 client will work with Facebook. It is true that writing a=
 fully
> compliant client will require more work.
>
> If it's more work to write libraries, then fewer libraries will be writte=
n, and
> they will be less well maintained. My primary goal with this spec is to m=
ake
> adoption as easy as possible and supported on as many platforms as
> possible. Part of the point of adopting a spec is you get to share code a=
cross
> libraries. If we start by saying "you'll have a different client library =
for each
> service" then doesn't that defeat the point?

This reflects your specific needs. Your view is that your users will most l=
ikely use S-Plain but that some large (and more sophisticated) clients will=
 use signatures. It sounds to me like you don't really care much about help=
ing the big guys because they should be able to write their own custom libr=
aries. If we create an environment where no one ever bothers to implement t=
he more advanced features because they don't have to, we might as well not =
bother including them.

A big part of our work is to figure out what is core and what is not. I thi=
nk signatures are core and consider the use of asymmetric secrets in OAuth =
as critical for the future of the web. If you consider protocols like Salmo=
n where pre-registration is not likely, being able to establish a client id=
entity simply by publishing a public key using discovery and using that to =
sign OAuth requests is an important use case.

If Facebook, Yahoo, Google, Microsoft, and others will all support S-Plain,=
 you will have libraries that work across many services, not just one, and =
I think this is a very likely scenario considering the interest these vendo=
rs have in adopting WRAP.

As an aside, I don't buy the argument (when it comes from the likes of the =
companies behind WRAP) that we should put the amateur developer on a pedest=
al and design web architecture to meet their needs. It is pathetic that the=
se companies have failed to produce quality open source libraries or make a=
 significant contribution to them over the past two years. That includes my=
 own employer (at least they pay for all the editorial work and documentati=
on I produce).

EHL


>
> On 1/28/10 10:33 PM, "David Recordon" <recordond@gmail.com> wrote:
> On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav
> <eran@hueniverse.com> wrote:
> (For the sake of simplicity, I am going to refer to the Plain bearer toke=
n with
> SSL/TLS as S-Plain) WRAP appeal is also its limitation and (strictly as w=
ritten) it
> sacrifices security for client ease. We still don't know what OAuth 2.0 i=
s (it is
> *not* WRAP, but likely to include ideas from it).
> How is security sacrificed in the S-Plain method proposed for OAuth 2.0? =
 I
> understand that WRAP makes sacrifices, but am I missing something in term=
s
> of moving a Plain bearer token always over SSL/TLS when making
> authentication requests?
> The problem I have with your approach is that you are mandating server
> deployment and given that this is a security protocol, we have no busines=
s
> telling servers what they MUST implement (they might consider S-Plain too
> weak for their needs). There are many reasons why vendors would rather
> not use the S-Plain option (you listed some of those) for every protected
> resource request. There are also many reasons why vendors would only
> support S-Plain and no signature option.
> My proposal allows you to do everything you have asked for and your
> developers will have an easy life with the S-Plain option, or performance=
 /
> flexibility with one of the HMAC methods. But the advantage is that I do =
not
> mandate Facebook to do anything it doesn't want. Any OAuth 2.0 client wil=
l
> work with Facebook.
> It is true that writing a fully compliant client will require more work. =
But the
> whole point of the S-Plain option is that it requires *no* additional lib=
rary
> beyond having SSL/TLS available. So this is a vendor support issue - if y=
ou
> want to enable a library-less client development, offer S-Plain. This aga=
in, is a
> vendor choice.
> Yes, but the tradeoff here is that a client will have S-Plain plus two or=
 three
> other algorithms.  The library size is increased, the complexity is incre=
ased,
> and it encourages servers (like Facebook) to develop separate libraries w=
hich
> only support the one or two methods they have chosen to use.  Luke and I
> would like to avoid creating Facebook specific client libraries.  (This i=
s of
> course based on the assumption that the majority of implementations will
> adopt S-Plain.  We then envision an advanced client library which also
> implements HMAC SHA-256.) Also keep in mind that the current proposal
> moves the algorithm choice to the token request/issue phase. Each token
> will only work with a single algorithm (which is better cryptographic hyg=
iene).
> So a vendor can choose to allow the client to pick the algorithm they wan=
t to
> you, or just tell them which one they are going to use.
>
> EHL
>
>
>
> From: Luke Shepard [mailto:lshepard@facebook.com]
> Sent: Thursday, January 28, 2010 6:36 PM
> To: Eran Hammer-Lahav; oauth@ietf.org
> Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth
> communication
>
>
> Thanks for the detailed reply, Eran.
>
> I think that your proposed design has it backwards: servers should bear
> complexity and one-time costs, not clients. Much of why I think OAuth WRA=
P
> / 2.0 is so appealing is that it dramatically simplifies life for develop=
ers. If a
> client can support SSL and doesn't want to deal with signatures, then the=
y
> never should have to. I want to be able to write a very lightweight SSL-o=
nly
> client library that is still fully OAuth 2.0 compatible.
>
> I think instead, the consensus should be:
> * Support an extensible set of signature algorithms * Servers required to
> support plaintext tokens over a secure channel (SSL/TLS) * Servers requir=
ed
> to support at least one or a small subset of encryption algorithms. Possi=
ble
> candidates include hmac-sha-1, hmac-sha-256, and rsassa....
> * Clients must support at least ONE of the required encryption methods
>
> If a client supports at least one of the required methods (SSL or one of =
the
> algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly
> supports encryption methods that are not in the required list, then it is
> partially compliant - that is, it may work with a specific vendor that ad=
vertises
> support for that algorithm, but it won't work with all servers. As algori=
thms
> gradually change over time, client libraries can be upgraded while server=
s
> need to maintain backwards compatibility. (For example, Facebook will
> deprecate MD5 as its sig algorithm, but will continue to support it for t=
he
> clients using it in the wild)
>
> As a concrete example of what can be written when you don't need to worry
> about encryption, see: http://github.com/lshepard/oauth-wrap-
> demo/tree/master/src/wrap.js
> If I were to modify that JS to accommodate multiple signature algorithms,
> then I would need to include at least another 1-2k of JavaScript for each
> method just in case. That would be fairly ridiculous.
>
>
> On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com
> <http://eran@hueniverse.com> > wrote:
> Thanks Luke. This is a useful analysis.
>
> I believe we have already reached consensus in this regard:
>
> * Support an extensible set of signature algorithms
> * Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
> * Define a plain method for bearer tokens and either require SSL/TLS or
> strongly recommend it (open issue)
>
> (if these assumptions are incorrect, raise your hand now)
>
> The specification is going to define the four methods above (and possibly
> more) as *must implement*. This does not mean vendors have to support all
> of them, but that any *client* library or application claiming to be 'OAu=
th 2.0
> compliant' must implement all these methods.
>
> If a vendor issues tokens not using all these methods (which is more like=
ly), it
> does not have to implement all these methods and can still be called 'OAu=
th
> 2.0 compliant' because any it can interop with *any* compliant library.
> However, if such a vendor produces a client library for its developers wh=
ich
> only implements the methods deployed by the vendor, that library is 'OAut=
h
> 2.0 partially compliant' (because it will not interop with *all* vendors)=
.
>
> In practice, from Facebook's perspective, you will be able to deploy OAut=
h
> 2.0 in a compliant way, while only implementing the methods that you find
> suitable for your developers. It sounds like you will be using the plain =
method
> over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually
> makes things trivial for its developers, I expect Facebook to produce lib=
raries
> that will implement these two methods, but not others. This will be a
> 'Facebook API' library that uses OAuth 2.0. It will be partially complian=
t but
> this only means it is only guaranteed to work with Facebook, but that it =
does
> so in a fully compliant way.
>
> EHL
>
>
>
>
>
> From: oauth-bounces@ietf.org <http://oauth-
> bounces@ietf.org>  [mailto:oauth-bounces@ietf.org] On Behalf Of Luke
> Shepard
> Sent: Thursday, January 28, 2010 7:30 AM
> To: oauth@ietf.org <http://oauth@ietf.org>
> Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth
> communication
>
> In the discussions around the OAuth WRAP spec, one of the questions often
> asked is, "why use SSL exclusively?" Several of us have done a lot of thi=
nking
> on it and I wanted to articulate my understanding of the pros and cons of=
 the
> approach for discussion. The use case I primarily have in mind is that of=
 a web
> service, like Facebook, Twitter, or Google services. Our service is prima=
rily
> authenticated via the Web, but we have a use for all of the WRAP profiles
> (web app, client app, desktop, mobile).
>
> Overall, I think that the simplicity of using SSL outweighs all the assoc=
iated
> costs for most developers. However, we should offer plaintext signatures =
as
> an optional performance enhancement for advanced developers.
>
> =3D=3D Advantages of using SSL for API calls
>
> -- It's overwhelmingly simpler for developers.
> I've implemented OpenID and OAuth, and I've worked for years with
> developers trying to handle signatures on the Facebook Platform. In my
> experience, calculating signatures is one of the most complex and difficu=
lt
> parts of an authentication protocol, and developers often get it wrong. B=
y
> moving that piece down the stack we can get it out of their way and let
> developers focus on building their apps.
>
> -- Existing tools ecosystem
> It's not that SSL is a simpler encryption protocol than OAuth (it's not) =
but
> rather that commonly available tools almost universally support it - ever=
y
> major web browser, as well as most libraries for making HTTP requests (li=
ke
> curl) have built-in support for SSL. For OAuth 1.0, you need to use a cli=
ent
> library just to construct your very first request.
>
> -- Smaller client libraries
> A good chunk of code in many client libraries is devoted to calculating a=
nd
> verifying signatures. For example, the OpenID PHP library imports several
> BigMath modules and encryption schemes. Even the relatively simpler
> Facebook client library requires several functions to sign requests. This
> makes the client libraries a black box and impedes understanding.
>
> Wouldn't it be great if we could write a protocol that doesn't even requi=
re a
> client library to implement? If I could just make an authenticated API re=
quest
> in my browser, as easily as with Basic Auth?
>
> =3D=3D Disadvantages of using SSL for API calls
>
> -- Difficulties of debugging
>
> Both signatures and SSL present difficulties in debugging, but they tend =
to be
> different. While with signatures you worry about composing the arguments
> wrong or using the wrong algorithm, with SSL you worry about reading the
> request over the wire. You can't sniff a request, and to intercept it, yo=
u need
> an HTTP proxy that understands SSL, and you need to worry about invalid
> certificate errors. To aid in this, providers will probably offer a non-S=
SL
> endpoint for debugging, but they may need to set up a sandbox
> environment to prevent damage from tokens exposed in plaintext.
>
> -- Variable costs for providers
>
> Server CPU costs will increase when handling SSL requests - especially on
> every API call instead of just at the auth stage. At scale, this can beco=
me
> expensive, although it can be offset by using specialized hardware to
> terminate the SSL connection. All the big companies I've talked to are
> comfortable trading these higher costs for increased adoption due to the
> simplicity.
>
> -- Fixed costs for smaller providers
>
> There is a fixed cost to obtaining and signing an SSL certificates, altho=
ugh that
> has dropped in recent years such that an operator can have a cert signed =
for
> a single domain for pretty cheap.
>
> -- Latency
>
> SSL connections take more time to establish than normal HTTP connections.
> Servers can use specialized hardware to speed it up, but clients rarely d=
o,
> which means that for client-to-server API requests, there may be some
> higher latency in each request. Smaller, mobile devices may be
> disproportionately affected by this, but as they grow more powerful it's =
less
> of a concern. Already today newer phones can handle SSL just fine.
>
> -- Browser limitations for cross domain communication
>
> A more niche disadvantage is that some cross domain communication
> techniques require the protocol of the parent page to match that of the
> endpoint being queried. So for example, in some browsers, for some API
> calls, it would be impossible to make an API call to an HTTPS endpoint fr=
om a
> normal HTTP page. However, as browsers advance and HTML5 methods like
> postMessage become more common, this will become less of an issue.
>
> -- Verifying information on the relying party
>
> If information is passed from a Service Provider to a Consumer through th=
e
> user's browser, then that information cannot be verified without an API c=
all,
> unless a signature is provided. Similar to stateful vs. stateless mode in=
 the
> OpenID 2.0 spec, the signature can serve as a performance enhancement to
> avoid an API call.
>
> =3D=3D Providing a non-SSL option for the short head
>
> Most platforms tend to have a small number of fairly large developers and
> then a really large number of smaller developers. The former are typicall=
y
> experienced (or at least, they are by the time they get big) and have mad=
e a
> large investment in the platform. The latter range from experienced
> developers to amateurs to folks that would not typically program. For thi=
s
> spec to be successful, it must meet the needs of both groups.
>
> Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever
> because we want to help our long tail developers use our platform more
> easily. For the long tail, the simplicity provided by SSL will be crucial=
. It means
> smaller or nonexistent client libaries, it means that developers can just=
 try
> out the API by typing it into a web browser, and it will help reduce debu=
gging
> and maintenance costs.
>
> However, for the short head of high volume developers, we probably want
> an option to use something other than SSL to make secure requests. These
> developers tend to have already solved the low hanging performance fruit,
> and for them it may be a significant penalty to pay the SSL connection co=
st on
> every request. To that end, I think it's pretty important that OAuth 2.0
> support a method other than SSL as an option for advanced developers. But
> it should be just that - an option, and only for advanced developers, so =
that
> beginning programmers and folks learning an API don't need to worry about
> signatures when they just want to play around.
>
> Please let me know if I'm missing something or if my assumptions sound
> incorrect.
>
> -Luke Shepard
> Software Engineer, Facebook Platform
>
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth


From john.hurliman@intel.com  Fri Jan 29 10:14:27 2010
Return-Path: <john.hurliman@intel.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C1B1F3A6359 for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 10:14:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.05
X-Spam-Level: 
X-Spam-Status: No, score=-6.05 tagged_above=-999 required=5 tests=[AWL=-0.052,  BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rvDwRf5dqg-G for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 10:14:08 -0800 (PST)
Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by core3.amsl.com (Postfix) with ESMTP id 221F03A6A2A for <oauth@ietf.org>; Fri, 29 Jan 2010 10:14:02 -0800 (PST)
Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga101.jf.intel.com with ESMTP; 29 Jan 2010 10:12:55 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="4.49,369,1262592000";  d="scan'208,217";a="591564365"
Received: from rrsmsx602.amr.corp.intel.com ([10.31.0.33]) by orsmga001.jf.intel.com with ESMTP; 29 Jan 2010 10:13:56 -0800
Received: from rrsmsx506.amr.corp.intel.com ([10.31.0.39]) by rrsmsx602.amr.corp.intel.com ([10.31.0.33]) with mapi; Fri, 29 Jan 2010 11:13:59 -0700
From: "Hurliman, John" <john.hurliman@intel.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 29 Jan 2010 11:13:55 -0700
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqgrPfOGBNEmkaqSUuZKa5RikmUIAADBKBgABU4nJA=
Message-ID: <62BFE5680C037E4DA0B0A08946C0933DC746B868@rrsmsx506.amr.corp.intel.com>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <C787897C.1C8A7%lshepard@facebook.com> <90C41DD21FB7C64BB94121FBBC2E723437899D258E@P3PW5EX1MB01.EX1.SECURESERVER.NET> <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723437899D25C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
In-Reply-To: <90C41DD21FB7C64BB94121FBBC2E723437899D25C7@P3PW5EX1MB01.EX1.SECURESERVER.NET>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_62BFE5680C037E4DA0B0A08946C0933DC746B868rrsmsx506amrcor_"
MIME-Version: 1.0
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 18:14:27 -0000

--_000_62BFE5680C037E4DA0B0A08946C0933DC746B868rrsmsx506amrcor_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I'm fine with letting the market decide whether to use SSL or implement the=
ir own crypto in libraries (I know our implementations will choose SSL-only=
), but that means we'll be going from fully compliant with OAuth WRAP to pa=
rtially compliant with OAuth 2.0 by making the same choices. Some concern w=
as raised that the client library offerings will fragment because of this, =
but I think it's more likely there will just be two versions of OAuth 2.0 c=
lient libraries. The thin SSL-only version of the library used by Facebook,=
 VWRAP, and anyone else that is fine with the SSL mode, and the thick clien=
t lib used by vendors that require other modes.

John

From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] On Behalf Of E=
ran Hammer-Lahav
Sent: Friday, January 29, 2010 12:12 AM
To: David Recordon
Cc: oauth@ietf.org
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication

For one, we know never to assume that SSL is implemented correctly (not in =
terms of the libraries but how certificate exceptions are handled and how i=
ts defenses can be compromised). S-Plain also exposes the secret to interme=
diaries while signatures can pass through without being compromised. I am s=
ure Ben Laurie and others can list more differences (and hope they will).

I disagree with your second comment about client library size. Typically if=
 you have one crypto algorithm, you have many others available. And if you =
are suggesting that by requiring only S-Plain it will enable crypto-less li=
braries, I would rather the community avoided producing such limited *libra=
ries*. If we make it ok not to support signatures in generic libraries, it =
will make it even harder for vendors to offer them.

At the end, the market will decide between signatures and S-Plain, the same=
 way the RSA method in OAuth 1.0 gained very little traction (mostly becaus=
e it was underspecified IMO). I don't think we should make that decision he=
re.

EHL


From: David Recordon [mailto:recordond@gmail.com]
Sent: Thursday, January 28, 2010 10:33 PM
To: Eran Hammer-Lahav
Cc: Luke Shepard; oauth@ietf.org
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication

On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav <eran@hueniverse.com<mai=
lto:eran@hueniverse.com>> wrote:
(For the sake of simplicity, I am going to refer to the Plain bearer token =
with SSL/TLS as S-Plain)
WRAP appeal is also its limitation and (strictly as written) it sacrifices =
security for client ease. We still don't know what OAuth 2.0 is (it is *not=
* WRAP, but likely to include ideas from it).
How is security sacrificed in the S-Plain method proposed for OAuth 2.0?  I=
 understand that WRAP makes sacrifices, but am I missing something in terms=
 of moving a Plain bearer token always over SSL/TLS when making authenticat=
ion requests?

The problem I have with your approach is that you are mandating server depl=
oyment and given that this is a security protocol, we have no business tell=
ing servers what they MUST implement (they might consider S-Plain too weak =
for their needs). There are many reasons why vendors would rather not use t=
he S-Plain option (you listed some of those) for every protected resource r=
equest. There are also many reasons why vendors would only support S-Plain =
and no signature option.
My proposal allows you to do everything you have asked for and your develop=
ers will have an easy life with the S-Plain option, or performance / flexib=
ility with one of the HMAC methods. But the advantage is that I do not mand=
ate Facebook to do anything it doesn't want. Any OAuth 2.0 client will work=
 with Facebook.
It is true that writing a fully compliant client will require more work. Bu=
t the whole point of the S-Plain option is that it requires *no* additional=
 library beyond having SSL/TLS available. So this is a vendor support issue=
 - if you want to enable a library-less client development, offer S-Plain. =
This again, is a vendor choice.
Yes, but the tradeoff here is that a client will have S-Plain plus two or t=
hree other algorithms.  The library size is increased, the complexity is in=
creased, and it encourages servers (like Facebook) to develop separate libr=
aries which only support the one or two methods they have chosen to use.  L=
uke and I would like to avoid creating Facebook specific client libraries. =
 (This is of course based on the assumption that the majority of implementa=
tions will adopt S-Plain.  We then envision an advanced client library whic=
h also implements HMAC SHA-256.)

Also keep in mind that the current proposal moves the algorithm choice to t=
he token request/issue phase. Each token will only work with a single algor=
ithm (which is better cryptographic hygiene). So a vendor can choose to all=
ow the client to pick the algorithm they want to you, or just tell them whi=
ch one they are going to use.

EHL


From: Luke Shepard [mailto:lshepard@facebook.com<mailto:lshepard@facebook.c=
om>]
Sent: Thursday, January 28, 2010 6:36 PM
To: Eran Hammer-Lahav; oauth@ietf.org<mailto:oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth co=
mmunication

Thanks for the detailed reply, Eran.

I think that your proposed design has it backwards: servers should bear com=
plexity and one-time costs, not clients. Much of why I think OAuth WRAP / 2=
.0 is so appealing is that it dramatically simplifies life for developers. =
If a client can support SSL and doesn't want to deal with signatures, then =
they never should have to. I want to be able to write a very lightweight SS=
L-only client library that is still fully OAuth 2.0 compatible.

I think instead, the consensus should be:

 *   Support an extensible set of signature algorithms
 *   Servers required to support plaintext tokens over a secure channel (SS=
L/TLS)
 *   Servers required to support at least one or a small subset of encrypti=
on algorithms. Possible candidates include hmac-sha-1, hmac-sha-256, and rs=
assa....
 *   Clients must support at least ONE of the required encryption methods

If a client supports at least one of the required methods (SSL or one of th=
e algorithms), then it can be considered fully OAuth 2.0 compliant. If it o=
nly supports encryption methods that are not in the required list, then it =
is partially compliant - that is, it may work with a specific vendor that a=
dvertises support for that algorithm, but it won't work with all servers. A=
s algorithms gradually change over time, client libraries can be upgraded w=
hile servers need to maintain backwards compatibility. (For example, Facebo=
ok will deprecate MD5 as its sig algorithm, but will continue to support it=
 for the clients using it in the wild)

As a concrete example of what can be written when you don't need to worry a=
bout encryption, see: http://github.com/lshepard/oauth-wrap-demo/tree/maste=
r/src/wrap.js
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen I would need to include at least another 1-2k of JavaScript for each me=
thod just in case. That would be fairly ridiculous.


On 1/28/10 1:41 PM, "Eran Hammer-Lahav" <eran@hueniverse.com<http://eran@hu=
eniverse.com>> wrote:
Thanks Luke. This is a useful analysis.

I believe we have already reached consensus in this regard:

* Support an extensible set of signature algorithms
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256
* Define a plain method for bearer tokens and either require SSL/TLS or str=
ongly recommend it (open issue)

(if these assumptions are incorrect, raise your hand now)

The specification is going to define the four methods above (and possibly m=
ore) as *must implement*. This does not mean vendors have to support all of=
 them, but that any *client* library or application claiming to be 'OAuth 2=
.0 compliant' must implement all these methods.

If a vendor issues tokens not using all these methods (which is more likely=
), it does not have to implement all these methods and can still be called =
'OAuth 2.0 compliant' because any it can interop with *any* compliant libra=
ry. However, if such a vendor produces a client library for its developers =
which only implements the methods deployed by the vendor, that library is '=
OAuth 2.0 partially compliant' (because it will not interop with *all* vend=
ors).

In practice, from Facebook's perspective, you will be able to deploy OAuth =
2.0 in a compliant way, while only implementing the methods that you find s=
uitable for your developers. It sounds like you will be using the plain met=
hod over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually =
makes things trivial for its developers, I expect Facebook to produce libra=
ries that will implement these two methods, but not others. This will be a =
'Facebook API' library that uses OAuth 2.0. It will be partially compliant =
but this only means it is only guaranteed to work with Facebook, but that i=
t does so in a fully compliant way.

EHL





From: oauth-bounces@ietf.org<http://oauth-bounces@ietf.org> [mailto:oauth-b=
ounces@ietf.org] On Behalf Of Luke Shepard
Sent: Thursday, January 28, 2010 7:30 AM
To: oauth@ietf.org<http://oauth@ietf.org>
Subject: [OAUTH-WG] Discussion of SSL as the primary means for OAuth commun=
ication

In the discussions around the OAuth WRAP spec, one of the questions often a=
sked is, "why use SSL exclusively?" Several of us have done a lot of thinki=
ng on it and I wanted to articulate my understanding of the pros and cons o=
f the approach for discussion. The use case I primarily have in mind is tha=
t of a web service, like Facebook, Twitter, or Google services. Our service=
 is primarily authenticated via the Web, but we have a use for all of the W=
RAP profiles (web app, client app, desktop, mobile).

Overall, I think that the simplicity of using SSL outweighs all the associa=
ted costs for most developers. However, we should offer plaintext signature=
s as an optional performance enhancement for advanced developers.

=3D=3D Advantages of using SSL for API calls

-- It's overwhelmingly simpler for developers.
I've implemented OpenID and OAuth, and I've worked for years with developer=
s trying to handle signatures on the Facebook Platform. In my experience, c=
alculating signatures is one of the most complex and difficult parts of an =
authentication protocol, and developers often get it wrong. By moving that =
piece down the stack we can get it out of their way and let developers focu=
s on building their apps.

-- Existing tools ecosystem
It's not that SSL is a simpler encryption protocol than OAuth (it's not) bu=
t rather that commonly available tools almost universally support it - ever=
y major web browser, as well as most libraries for making HTTP requests (li=
ke curl) have built-in support for SSL. For OAuth 1.0, you need to use a cl=
ient library just to construct your very first request.

-- Smaller client libraries
A good chunk of code in many client libraries is devoted to calculating and=
 verifying signatures. For example, the OpenID PHP library imports several =
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k client library requires several functions to sign requests. This makes th=
e client libraries a black box and impedes understanding.

Wouldn't it be great if we could write a protocol that doesn't even require=
 a client library to implement? If I could just make an authenticated API r=
equest in my browser, as easily as with Basic Auth?

=3D=3D Disadvantages of using SSL for API calls

-- Difficulties of debugging

Both signatures and SSL present difficulties in debugging, but they tend to=
 be different. While with signatures you worry about composing the argument=
s wrong or using the wrong algorithm, with SSL you worry about reading the =
request over the wire. You can't sniff a request, and to intercept it, you =
need an HTTP proxy that understands SSL, and you need to worry about invali=
d certificate errors. To aid in this, providers will probably offer a non-S=
SL endpoint for debugging, but they may need to set up a sandbox environmen=
t to prevent damage from tokens exposed in plaintext.

-- Variable costs for providers

Server CPU costs will increase when handling SSL requests - especially on e=
very API call instead of just at the auth stage. At scale, this can become =
expensive, although it can be offset by using specialized hardware to termi=
nate the SSL connection. All the big companies I've talked to are comfortab=
le trading these higher costs for increased adoption due to the simplicity.

-- Fixed costs for smaller providers

There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h that has dropped in recent years such that an operator can have a cert si=
gned for a single domain for pretty cheap.

-- Latency

SSL connections take more time to establish than normal HTTP connections. S=
ervers can use specialized hardware to speed it up, but clients rarely do, =
which means that for client-to-server API requests, there may be some highe=
r latency in each request. Smaller, mobile devices may be disproportionatel=
y affected by this, but as they grow more powerful it's less of a concern. =
Already today newer phones can handle SSL just fine.

-- Browser limitations for cross domain communication

A more niche disadvantage is that some cross domain communication technique=
s require the protocol of the parent page to match that of the endpoint bei=
ng queried. So for example, in some browsers, for some API calls, it would =
be impossible to make an API call to an HTTPS endpoint from a normal HTTP p=
age. However, as browsers advance and HTML5 methods like postMessage become=
 more common, this will become less of an issue.

-- Verifying information on the relying party

If information is passed from a Service Provider to a Consumer through the =
user's browser, then that information cannot be verified without an API cal=
l, unless a signature is provided. Similar to stateful vs. stateless mode i=
n the OpenID 2.0 spec, the signature can serve as a performance enhancement=
 to avoid an API call.

=3D=3D Providing a non-SSL option for the short head

Most platforms tend to have a small number of fairly large developers and t=
hen a really large number of smaller developers. The former are typically e=
xperienced (or at least, they are by the time they get big) and have made a=
 large investment in the platform. The latter range from experienced develo=
pers to amateurs to folks that would not typically program. For this spec t=
o be successful, it must meet the needs of both groups.

Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we want to help our long tail developers use our platform more easily. For=
 the long tail, the simplicity provided by SSL will be crucial. It means sm=
aller or nonexistent client libaries, it means that developers can just try=
 out the API by typing it into a web browser, and it will help reduce debug=
ging and maintenance costs.

However, for the short head of high volume developers, we probably want an =
option to use something other than SSL to make secure requests. These devel=
opers tend to have already solved the low hanging performance fruit, and fo=
r them it may be a significant penalty to pay the SSL connection cost on ev=
ery request. To that end, I think it's pretty important that OAuth 2.0 supp=
ort a method other than SSL as an option for advanced developers. But it sh=
ould be just that - an option, and only for advanced developers, so that be=
ginning programmers and folks learning an API don't need to worry about sig=
natures when they just want to play around.

Please let me know if I'm missing something or if my assumptions sound inco=
rrect.

-Luke Shepard
Software Engineer, Facebook Platform

_______________________________________________
OAuth mailing list
OAuth@ietf.org<mailto:OAuth@ietf.org>
https://www.ietf.org/mailman/listinfo/oauth


--_000_62BFE5680C037E4DA0B0A08946C0933DC746B868rrsmsx506amrcor_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 12 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.EmailStyle19
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle20
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.Section1
	{page:Section1;}
 /* List Definitions */
 @list l0
	{mso-list-id:444158410;
	mso-list-template-ids:-374054746;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:575818768;
	mso-list-template-ids:2125206654;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>I&#8217;m fine with letting the market decide whether to use=
 SSL
or implement their own crypto in libraries (I know our implementations will
choose SSL-only), but that means we&#8217;ll be going from fully compliant =
with
OAuth WRAP to partially compliant with OAuth 2.0 by making the same choices=
.
Some concern was raised that the client library offerings will fragment bec=
ause
of this, but I think it&#8217;s more likely there will just be two versions=
 of
OAuth 2.0 client libraries. The thin SSL-only version of the library used b=
y
Facebook, VWRAP, and anyone else that is fine with the SSL mode, and the th=
ick
client lib used by vendors that require other modes.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>John<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>
oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org] <b>On Behalf Of </b>=
Eran
Hammer-Lahav<br>
<b>Sent:</b> Friday, January 29, 2010 12:12 AM<br>
<b>To:</b> David Recordon<br>
<b>Cc:</b> oauth@ietf.org<br>
<b>Subject:</b> Re: [OAUTH-WG] Discussion of SSL as the primary means for O=
Auth
communication<o:p></o:p></span></p>

</div>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>For one, we know never to assume that SSL is implemented
correctly (not in terms of the libraries but how certificate exceptions are
handled and how its defenses can be compromised). S-Plain also exposes the
secret to intermediaries while signatures can pass through without being
compromised. I am sure Ben Laurie and others can list more differences (and
hope they will).<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>I disagree with your second comment about client library siz=
e.
Typically if you have one crypto algorithm, you have many others available.=
 And
if you are suggesting that by requiring only S-Plain it will enable crypto-=
less
libraries, I would rather the community avoided producing such limited *<b>=
libraries</b>*.
If we make it ok not to support signatures in generic libraries, it will ma=
ke
it even harder for vendors to offer them.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>At the end, the market will decide between signatures and
S-Plain, the same way the RSA method in OAuth 1.0 gained very little tracti=
on
(mostly because it was underspecified IMO). I don&#8217;t think we should m=
ake
that decision here.<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'>EHL<o:p></o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<p class=3DMsoNormal><span style=3D'font-size:11.0pt;font-family:"Calibri",=
"sans-serif";
color:#1F497D'><o:p>&nbsp;</o:p></span></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'>

<p class=3DMsoNormal><b><span style=3D'font-size:10.0pt;font-family:"Tahoma=
","sans-serif"'>From:</span></b><span
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> David Recordo=
n
[mailto:recordond@gmail.com] <br>
<b>Sent:</b> Thursday, January 28, 2010 10:33 PM<br>
<b>To:</b> Eran Hammer-Lahav<br>
<b>Cc:</b> Luke Shepard; oauth@ietf.org<br>
<b>Subject:</b> Re: [OAUTH-WG] Discussion of SSL as the primary means for O=
Auth
communication<o:p></o:p></span></p>

</div>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

<p class=3DMsoNormal>On Thu, Jan 28, 2010 at 7:10 PM, Eran Hammer-Lahav &lt=
;<a
href=3D"mailto:eran@hueniverse.com">eran@hueniverse.com</a>&gt; wrote:<o:p>=
</o:p></p>

<div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<div>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>(For the sake of simplicity, I am =
going
to refer to the Plain bearer token with SSL/TLS as S-Plain)</span><o:p></o:=
p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>WRAP appeal is also its limitation=
 and
(strictly as written) it sacrifices security for client ease. We still
don&#8217;t know what OAuth 2.0 is (it is *<b>not</b>* WRAP, but likely to
include ideas from it).</span><o:p></o:p></p>

</div>

</div>

</blockquote>

<div>

<p class=3DMsoNormal>How is security sacrificed in the S-Plain method propo=
sed
for OAuth 2.0? &nbsp;I understand that WRAP makes sacrifices, but am I miss=
ing
something in terms of moving a Plain bearer token always over SSL/TLS when
making authentication requests?<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<div>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>The problem I have with your appro=
ach is
that you are mandating server deployment and given that this is a security
protocol, we have no business telling servers what they MUST implement (the=
y
might consider S-Plain too weak for their needs). There are many reasons wh=
y
vendors would rather not use the S-Plain option (you listed some of those) =
for
every protected resource request. There are also many reasons why vendors w=
ould
only support S-Plain and no signature option.</span><o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>My proposal allows you to do every=
thing
you have asked for and your developers will have an easy life with the S-Pl=
ain
option, or performance / flexibility with one of the HMAC methods. But the
advantage is that I do not mandate Facebook to do anything it doesn&#8217;t
want. Any OAuth 2.0 client will work with Facebook.</span><o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>It is true that writing a fully
compliant client will require more work. But the whole point of the S-Plain
option is that it requires *<b>no</b>* additional library beyond having SSL=
/TLS
available. So this is a vendor support issue &#8211; if you want to enable =
a
library-less client development, offer S-Plain. This again, is a vendor cho=
ice.</span><o:p></o:p></p>

</div>

</div>

</blockquote>

<div>

<p class=3DMsoNormal>Yes, but the tradeoff here is that a client will have
S-Plain plus two or three other&nbsp;algorithms. &nbsp;The library size is
increased, the complexity is increased, and it encourages servers (like
Facebook) to develop separate libraries which only support the one or two
methods they have chosen to use. &nbsp;Luke and I would like to avoid creat=
ing
Facebook specific client libraries. &nbsp;(This is of course based on the
assumption that the majority of implementations will adopt S-Plain. &nbsp;W=
e
then envision an advanced client library which also implements HMAC SHA-256=
.)<o:p></o:p></p>

</div>

<div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

<blockquote style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0i=
n 0in 0in 6.0pt;
margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt'>

<div>

<div>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>Also keep in mind that the current
proposal moves the algorithm choice to the token request/issue phase. Each
token will only work with a single algorithm (which is better cryptographic
hygiene). So a vendor can choose to allow the client to pick the algorithm =
they
want to you, or just tell them which one they are going to use.</span><o:p>=
</o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>EHL</span><o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><span
style=3D'font-size:11.0pt;color:#1F497D'>&nbsp;</span><o:p></o:p></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in 0in =
4.0pt'>

<div>

<div style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'><b><span
style=3D'font-size:10.0pt'>From:</span></b><span style=3D'font-size:10.0pt'=
> Luke
Shepard [mailto:<a href=3D"mailto:lshepard@facebook.com" target=3D"_blank">=
lshepard@facebook.com</a>]
<br>
<b>Sent:</b> Thursday, January 28, 2010 6:36 PM<br>
<b>To:</b> Eran Hammer-Lahav; <a href=3D"mailto:oauth@ietf.org" target=3D"_=
blank">oauth@ietf.org</a><br>
<b>Subject:</b> Re: [OAUTH-WG] Discussion of SSL as the primary means for O=
Auth
communication</span><o:p></o:p></p>

</div>

</div>

<div>

<div>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt=
:auto'>&nbsp;<o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;margin-bottom:12.0pt'=
><span
style=3D'font-size:11.0pt'>Thanks for the detailed reply, Eran.<br>
<br>
I think that your proposed design has it backwards: servers should bear
complexity and one-time costs, not clients. Much of why I think OAuth WRAP =
/
2.0 is so appealing is that it dramatically simplifies life for developers.=
 If
a client can support SSL and doesn&#8217;t want to deal with signatures, th=
en
they never should have to. I want to be able to write a very lightweight
SSL-only client library that is still fully OAuth 2.0 compatible.<br>
<br>
I think instead, the consensus should be:</span><o:p></o:p></p>

<ul type=3Ddisc>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;
     mso-list:l0 level1 lfo3'><span style=3D'font-size:11.0pt'>Support an
     extensible set of signature algorithms </span><o:p></o:p></li>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;
     mso-list:l0 level1 lfo3'><span style=3D'font-size:11.0pt'>Servers requ=
ired
     to support plaintext tokens over a secure channel (SSL/TLS) </span><o:=
p></o:p></li>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;
     mso-list:l0 level1 lfo3'><span style=3D'font-size:11.0pt'>Servers requ=
ired
     to support at least one or a small subset of encryption algorithms.
     Possible candidates include hmac-sha-1, hmac-sha-256, and rsassa.... <=
/span><o:p></o:p></li>
 <li class=3DMsoNormal style=3D'mso-margin-top-alt:auto;mso-margin-bottom-a=
lt:auto;
     mso-list:l0 level1 lfo3'><span style=3D'font-size:11.0pt'>Clients must
     support at least ONE of the required encryption methods</span><o:p></o=
:p></li>
</ul>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;margin-bottom:12.0pt'=
><span
style=3D'font-size:11.0pt'><br>
If a client supports at least one of the required methods (SSL or one of th=
e
algorithms), then it can be considered fully OAuth 2.0 compliant. If it onl=
y
supports encryption methods that are not in the required list, then it is
partially compliant &#8211; that is, it may work with a specific vendor tha=
t
advertises support for that algorithm, but it won&#8217;t work with all
servers. As algorithms gradually change over time, client libraries can be
upgraded while servers need to maintain backwards compatibility. (For examp=
le,
Facebook will deprecate MD5 as its sig algorithm, but will continue to supp=
ort
it for the clients using it in the wild)<br>
<br>
As a concrete example of what can be written when you don&#8217;t need to w=
orry
about encryption, see: <a
href=3D"http://github.com/lshepard/oauth-wrap-demo/tree/master/src/wrap.js"
target=3D"_blank">http://github.com/lshepard/oauth-wrap-demo/tree/master/sr=
c/wrap.js</a><br>
If I were to modify that JS to accommodate multiple signature algorithms, t=
hen
I would need to include at least another 1-2k of JavaScript for each method
just in case. That would be fairly ridiculous.<br>
<br>
<br>
On 1/28/10 1:41 PM, &quot;Eran Hammer-Lahav&quot; &lt;<a
href=3D"http://eran@hueniverse.com" target=3D"_blank">eran@hueniverse.com</=
a>&gt;
wrote:</span><o:p></o:p></p>

<p class=3DMsoNormal style=3D'mso-margin-top-alt:auto;margin-bottom:12.0pt'=
><span
style=3D'font-size:11.0pt'>Thanks Luke. This is a useful analysis.<br>
&nbsp;<br>
I believe we have already reached consensus in this regard:<br>
&nbsp;<br>
* Support an extensible set of signature algorithms<br>
* Define hmac-sha-1, hmac-sha-256, and rsassa-pkcs1-v1.5-sha-256<br>
* Define a plain method for bearer tokens and either require SSL/TLS or
strongly recommend it (open issue)<br>
&nbsp;<br>
(if these assumptions are incorrect, raise your hand now)<br>
&nbsp;<br>
The specification is going to define the four methods above (and possibly m=
ore)
as *<b>must implement</b>*. This does not mean vendors have to support all =
of
them, but that any *<b>client</b>* library or application claiming to be
&#8216;OAuth 2.0 compliant&#8217; must implement all these methods.<br>
&nbsp;<br>
If a vendor issues tokens not using all these methods (which is more likely=
),
it does not have to implement all these methods and can still be called
&#8216;OAuth 2.0 compliant&#8217; because any it can interop with *<b>any</=
b>*
compliant library. However, if such a vendor produces a client library for =
its
developers which only implements the methods deployed by the vendor, that l=
ibrary
is &#8216;OAuth 2.0 partially compliant&#8217; (because it will not interop
with *<b>all</b>* vendors).<br>
&nbsp;<br>
In practice, from Facebook&#8217;s perspective, you will be able to deploy
OAuth 2.0 in a compliant way, while only implementing the methods that you =
find
suitable for your developers. It sounds like you will be using the plain me=
thod
over SSL and either hmac-sha-1 or hmac-sha-256. Since Facebook usually make=
s
things trivial for its developers, I expect Facebook to produce libraries t=
hat
will implement these two methods, but not others. This will be a
&#8216;Facebook API&#8217; library that uses OAuth 2.0. It will be partiall=
y
compliant but this only means it is only guaranteed to work with Facebook, =
but
that it does so in a fully compliant way.<br>
&nbsp;<br>
EHL<br>
&nbsp;<br>
&nbsp;<br>
&nbsp;<br>
&nbsp;<br>
<br>
</span><b><span style=3D'font-size:10.0pt'>From:</span></b><span
style=3D'font-size:10.0pt'> <a href=3D"http://oauth-bounces@ietf.org"
target=3D"_blank">oauth-bounces@ietf.org</a> [<a
href=3D"mailto:oauth-bounces@ietf.org" target=3D"_blank">mailto:oauth-bounc=
es@ietf.org</a>]
<b>On Behalf Of </b>Luke Shepard<br>
<b>Sent:</b> Thursday, January 28, 2010 7:30 AM<br>
<b>To:</b> <a href=3D"http://oauth@ietf.org" target=3D"_blank">oauth@ietf.o=
rg</a><br>
<b>Subject:</b> [OAUTH-WG] Discussion of SSL as the primary means for OAuth
communication<br>
</span><br>
<span style=3D'font-size:11.0pt'>In the discussions around the OAuth WRAP s=
pec,
one of the questions often asked is, &#8220;why use SSL exclusively?&#8221;
Several of us have done a lot of thinking on it and I wanted to articulate =
my
understanding of the pros and cons of the approach for discussion. The use =
case
I primarily have in mind is that of a web service, like Facebook, Twitter, =
or
Google services. Our service is primarily authenticated via the Web, but we
have a use for all of the WRAP profiles (web app, client app, desktop, mobi=
le).<br>
&nbsp;<br>
Overall, I think that the simplicity of using SSL outweighs all the associa=
ted
costs for most developers. However, we should offer plaintext signatures as=
 an
optional performance enhancement for advanced developers.<br>
<br>
=3D=3D Advantages of using SSL for API calls<br>
<br>
-- It&#8217;s overwhelmingly simpler for developers.<br>
I&#8217;ve implemented OpenID and OAuth, and I&#8217;ve worked for years wi=
th
developers trying to handle signatures on the Facebook Platform. In my
experience, calculating signatures is one of the most complex and difficult
parts of an authentication protocol, and developers often get it wrong. By
moving that piece down the stack we can get it out of their way and let
developers focus on building their apps.<br>
<br>
-- Existing tools ecosystem<br>
It&#8217;s not that SSL is a simpler encryption protocol than OAuth (it&#82=
17;s
not) but rather that commonly available tools almost universally support it
&#8211; every major web browser, as well as most libraries for making HTTP
requests (like curl) have built-in support for SSL. For OAuth 1.0, you need=
 to
use a client library just to construct your very first request.<br>
<br>
-- Smaller client libraries<br>
A good chunk of code in many client libraries is devoted to calculating and
verifying signatures. For example, the OpenID PHP library imports several
BigMath modules and encryption schemes. Even the relatively simpler Faceboo=
k
client library requires several functions to sign requests. This makes the
client libraries a black box and impedes understanding. <br>
<br>
Wouldn&#8217;t it be great if we could write a protocol that doesn&#8217;t =
even
require a client library to implement? If I could just make an authenticate=
d
API request in my browser, as easily as with Basic Auth?<br>
<br>
=3D=3D Disadvantages of using SSL for API calls<br>
<br>
-- Difficulties of debugging<br>
<br>
Both signatures and SSL present difficulties in debugging, but they tend to=
 be
different. While with signatures you worry about composing the arguments wr=
ong
or using the wrong algorithm, with SSL you worry about reading the request =
over
the wire. You can&#8217;t sniff a request, and to intercept it, you need an
HTTP proxy that understands SSL, and you need to worry about invalid
certificate errors. To aid in this, providers will probably offer a non-SSL
endpoint for debugging, but they may need to set up a sandbox environment t=
o
prevent damage from tokens exposed in plaintext.<br>
<br>
-- Variable costs for providers<br>
<br>
Server CPU costs will increase when handling SSL requests &#8211; especiall=
y on
every API call instead of just at the auth stage. At scale, this can become
expensive, although it can be offset by using specialized hardware to termi=
nate
the SSL connection. All the big companies I&#8217;ve talked to are comforta=
ble
trading these higher costs for increased adoption due to the simplicity.<br=
>
<br>
-- Fixed costs for smaller providers<br>
<br>
There is a fixed cost to obtaining and signing an SSL certificates, althoug=
h
that has dropped in recent years such that an operator can have a cert sign=
ed
for a single domain for pretty cheap.<br>
<br>
-- Latency<br>
<br>
SSL connections take more time to establish than normal HTTP connections.
Servers can use specialized hardware to speed it up, but clients rarely do,
which means that for client-to-server API requests, there may be some highe=
r
latency in each request. Smaller, mobile devices may be disproportionately
affected by this, but as they grow more powerful it&#8217;s less of a conce=
rn.
Already today newer phones can handle SSL just fine.<br>
<br>
-- Browser limitations for cross domain communication<br>
<br>
A more niche disadvantage is that some cross domain communication technique=
s
require the protocol of the parent page to match that of the endpoint being
queried. So for example, in some browsers, for some API calls, it would be
impossible to make an API call to an HTTPS endpoint from a normal HTTP page=
.
However, as browsers advance and HTML5 methods like postMessage become more
common, this will become less of an issue.<br>
<br>
-- Verifying information on the relying party<br>
<br>
If information is passed from a Service Provider to a Consumer through the
user&#8217;s browser, then that information cannot be verified without an A=
PI
call, unless a signature is provided. Similar to stateful vs. stateless mod=
e in
the OpenID 2.0 spec, the signature can serve as a performance enhancement t=
o
avoid an API call.<br>
<br>
=3D=3D Providing a non-SSL option for the short head<br>
<br>
Most platforms tend to have a small number of fairly large developers and t=
hen
a really large number of smaller developers. The former are typically
experienced (or at least, they are by the time they get big) and have made =
a
large investment in the platform. The latter range from experienced develop=
ers
to amateurs to folks that would not typically program. For this spec to be
successful, it must meet the needs of both groups.<br>
<br>
Facebook is very interested in adopting OAuth WRAP / 2.0 / whatever because=
 we
want to help our long tail developers use our platform more easily. For the
long tail, the simplicity provided by SSL will be crucial. It means smaller=
 or
nonexistent client libaries, it means that developers can just try out the =
API
by typing it into a web browser, and it will help reduce debugging and
maintenance costs.<br>
<br>
However, for the short head of high volume developers, we probably want an =
option
to use something other than SSL to make secure requests. These developers t=
end
to have already solved the low hanging performance fruit, and for them it m=
ay
be a significant penalty to pay the SSL connection cost on every request. T=
o
that end, I think it&#8217;s pretty important that OAuth 2.0 support a meth=
od
other than SSL as an option for advanced developers. But it should be just =
that
&#8211; an option, and only for advanced developers, so that beginning
programmers and folks learning an API don&#8217;t need to worry about
signatures when they just want to play around.<br>
<br>
Please let me know if I&#8217;m missing something or if my assumptions soun=
d
incorrect.<br>
<br>
-Luke Shepard<br>
Software Engineer, Facebook Platform</span><o:p></o:p></p>

</div>

</div>

</div>

</div>

</div>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><br>
_______________________________________________<br>
OAuth mailing list<br>
<a href=3D"mailto:OAuth@ietf.org">OAuth@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/oauth" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/oauth</a><o:p></o:p></p>

</blockquote>

</div>

<p class=3DMsoNormal><o:p>&nbsp;</o:p></p>

</div>

</div>

</div>

</body>

</html>

--_000_62BFE5680C037E4DA0B0A08946C0933DC746B868rrsmsx506amrcor_--

From hannes.tschofenig@nsn.com  Fri Jan 29 11:24:20 2010
Return-Path: <hannes.tschofenig@nsn.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 49AF53A6803 for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 11:24:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.793
X-Spam-Level: 
X-Spam-Status: No, score=-1.793 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VgGaj+5uY--c for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 11:24:18 -0800 (PST)
Received: from demumfd002.nsn-inter.net (demumfd002.nsn-inter.net [93.183.12.31]) by core3.amsl.com (Postfix) with ESMTP id 69F4B3A67BD for <oauth@ietf.org>; Fri, 29 Jan 2010 11:24:18 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd002.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id o0TJOdBa021406 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 29 Jan 2010 20:24:39 +0100
Received: from demuexc024.nsn-intra.net (demuexc024.nsn-intra.net [10.159.32.11]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id o0TJOdY3006028; Fri, 29 Jan 2010 20:24:39 +0100
Received: from FIESEXC015.nsn-intra.net ([10.159.0.23]) by demuexc024.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.3959);  Fri, 29 Jan 2010 20:24:39 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Fri, 29 Jan 2010 21:24:39 +0200
Message-ID: <3D3C75174CB95F42AD6BCC56E5555B450220F59F@FIESEXC015.nsn-intra.net>
In-Reply-To: <1562D46F-058C-4EE6-956C-469719CA3E81@xmlgrrl.com>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: [OAUTH-WG] FYI, UMA webinar followup
Thread-Index: AcqeDBRGfd5kq5nFSVCbT3Dk1QfSVQDAdHEA
References: <1562D46F-058C-4EE6-956C-469719CA3E81@xmlgrrl.com>
From: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
To: "ext Eve Maler" <eve@xmlgrrl.com>, "OAuth WG" <oauth@ietf.org>
X-OriginalArrivalTime: 29 Jan 2010 19:24:39.0526 (UTC) FILETIME=[B3707860:01CAA118]
Subject: Re: [OAUTH-WG] FYI, UMA webinar followup
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 19:24:20 -0000

I registered for the seminar, got the bridge info, dialed in and nobody
was there.=20
Are there slides available?=20

>-----Original Message-----
>From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org]=20
>On Behalf Of ext Eve Maler
>Sent: 25 January, 2010 14:03
>To: OAuth WG
>Subject: [OAUTH-WG] FYI, UMA webinar followup
>
>I think I mentioned on last week's call that those of us=20
>working on UMA are doing a status update in a webinar on=20
>Thursday of this week.  You're invited to sign up (there's a=20
>small handful of slots left).  Info and registration link are here:
>
>http://kantarainitiative.org/confluence/display/uma/Meetings+an
>d+Minutes
>
>	Eve
>
>Eve Maler
>eve@xmlgrrl.com
>http://www.xmlgrrl.com/blog
>
>_______________________________________________
>OAuth mailing list
>OAuth@ietf.org
>https://www.ietf.org/mailman/listinfo/oauth
>

From eran@hueniverse.com  Fri Jan 29 11:25:00 2010
Return-Path: <eran@hueniverse.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 29F893A67BD for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 11:25:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level: 
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[AWL=-0.107, BAYES_00=-2.599, HTML_MESSAGE=0.001, SARE_BAYES_5x7=0.6]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y6YHfoEbzP0T for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 11:24:56 -0800 (PST)
Received: from p3plex1out01.prod.phx3.secureserver.net (p3plex1out01.prod.phx3.secureserver.net [72.167.180.17]) by core3.amsl.com (Postfix) with SMTP id 9F5583A6961 for <oauth@ietf.org>; Fri, 29 Jan 2010 11:24:56 -0800 (PST)
Received: (qmail 26963 invoked from network); 29 Jan 2010 19:25:19 -0000
Received: from unknown (HELO smtp.ex1.secureserver.net) (72.167.180.20) by p3plex1out01.prod.phx3.secureserver.net with SMTP; 29 Jan 2010 19:25:18 -0000
Received: from P3PW5EX1MB01.EX1.SECURESERVER.NET ([10.6.135.20]) by P3PW5EX1HT002.EX1.SECURESERVER.NET ([72.167.180.20]) with mapi; Fri, 29 Jan 2010 12:25:14 -0700
From: Eran Hammer-Lahav <eran@hueniverse.com>
To: "Hurliman, John" <john.hurliman@intel.com>
Date: Fri, 29 Jan 2010 12:25:01 -0700
Thread-Topic: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
Thread-Index: AcqhGMeMfejtCJdoSd+GzkYrkTw6ew==
Message-ID: <A2CF729A-1812-48C9-8C96-23BAD0947C49@hueniverse.com>
References: <90C41DD21FB7C64BB94121FBBC2E723437899D24CF@P3PW5EX1MB01.EX1.SECURESERVER.NET> <C787897C.1C8A7%lshepard@facebook.com> <90C41DD21FB7C64BB94121FBBC2E723437899D258E@P3PW5EX1MB01.EX1.SECURESERVER.NET> <fd6741651001282233k4a56234dq9a419026009b405f@mail.gmail.com> <90C41DD21FB7C64BB94121FBBC2E723437899D25C7@P3PW5EX1MB01.EX1.SECURESERVER.NET> <62BFE5680C037E4DA0B0A08946C0933DC746B868@rrsmsx506.amr.corp.intel.com>
In-Reply-To: <62BFE5680C037E4DA0B0A08946C0933DC746B868@rrsmsx506.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_A2CF729A181248C98C9623BAD0947C49hueniversecom_"
MIME-Version: 1.0
Cc: "oauth@ietf.org" <oauth@ietf.org>
Subject: Re: [OAUTH-WG] Discussion of SSL as the primary means for OAuth communication
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 19:25:00 -0000

--_000_A2CF729A181248C98C9623BAD0947C49hueniversecom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_A2CF729A181248C98C9623BAD0947C49hueniversecom_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_A2CF729A181248C98C9623BAD0947C49hueniversecom_--

From grastogi@adobe.com  Fri Jan 29 11:58:15 2010
Return-Path: <grastogi@adobe.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0483E3A67E7 for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 11:58:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.598
X-Spam-Level: 
X-Spam-Status: No, score=-6.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PPDzQpanIvcv for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 11:58:13 -0800 (PST)
Received: from exprod6og116.obsmtp.com (exprod6og116.obsmtp.com [64.18.1.37]) by core3.amsl.com (Postfix) with ESMTP id 640753A67DA for <oauth@ietf.org>; Fri, 29 Jan 2010 11:58:13 -0800 (PST)
Received: from source ([192.150.11.134]) by exprod6ob116.postini.com ([64.18.5.12]) with SMTP ID DSNKS2M97FlvitiHHd+tlbSK3yoQr+YAWEW5@postini.com; Fri, 29 Jan 2010 11:58:37 PST
Received: from inner-relay-3.eur.adobe.com ([192.150.8.236]) by outbound-smtp-1.corp.adobe.com (8.12.10/8.12.10) with ESMTP id o0TJok18029149 for <oauth@ietf.org>; Fri, 29 Jan 2010 11:50:46 -0800 (PST)
Received: from nahub01.corp.adobe.com (nahub01.corp.adobe.com [10.8.189.97]) by inner-relay-3.eur.adobe.com (8.12.10/8.12.9) with ESMTP id o0TJtA8F016787 for <oauth@ietf.org>; Fri, 29 Jan 2010 11:58:33 -0800 (PST)
Received: from nacas03.corp.adobe.com (10.8.189.121) by nahub01.corp.adobe.com (10.8.189.97) with Microsoft SMTP Server (TLS) id 8.1.375.2; Fri, 29 Jan 2010 11:58:17 -0800
Received: from NAMBX02.corp.adobe.com ([10.8.127.96]) by nacas03.corp.adobe.com ([10.8.189.121]) with mapi; Fri, 29 Jan 2010 11:58:17 -0800
From: Gaurav Rastogi <grastogi@adobe.com>
To: "oauth@ietf.org" <oauth@ietf.org>
Date: Fri, 29 Jan 2010 11:58:15 -0800
Thread-Topic: exclude hostname and port number from normalized string 
Thread-Index: AcqhHWZGuxOibMAvTH6CoQs6W0OgBg==
Message-ID: <CF4F27E3-920D-49C2-A871-EABA4B1A0F10@adobe.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: multipart/alternative; boundary="_000_CF4F27E3920D49C2A871EABA4B1A0F10adobecom_"
MIME-Version: 1.0
Subject: [OAUTH-WG] exclude hostname and port number from normalized string
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 20:03:58 -0000

--_000_CF4F27E3920D49C2A871EABA4B1A0F10adobecom_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

This proposal is to allow use of same token to access multiple
protected resource across different servers. At minimum making it
optional would help in wide variety of media delivery use cases.

Proposal details:
Exclude hostname and port number in normalized request string
creation. Another possible approach could be to allow modifications
of the subdomains as consistent with the name server RFC.

Background: Adobe Media Streaming (HTTP and RTMP) use cases.
Current Adobe's IPTV and web video services partners including large
media broadcasting companies, CDN services, and IPTV solutions vendors
all face the problem that multiple resources need to be used for
making a single web video experience.

In case of HTTP media streaming a single content delivery may comprise
of hundreds of individual http fragments served that are delivered
over multiple network connections using multiple media assets. In
addition, Advertising, DRM and License server API/interaction may also
be involved.

When dynamic streaming or multi-bit rate media is being streamed then
fragments from different versions of the asset are requested based on
real time network and client feedback. Client re-authorization can
result in high a latency and non-realtime system degrading the user
experience in wide variety of rich media solutions delivered over the
internet.

In several load balancing solutions like CENAME or request redirection
may modify server URI based on runtime considerations. Many CDN
workflows and global Internet services use such schemes. Having
mandatory hostname, which could have been modified, restricts use of
HTTP token obtained before the load balancing decision was made.

Example workflow
     +---+                                  +---------------+
     | C |--(A)------ credentials --------->| Authorization |
     |  l  |<-(B)------ Access Token ---------| Server        |
     | i |                                  +---------------+
     | e |
     | n |  +---+            Access Token          +---------------+
     | t |  | W |--(C)----- in HTTP header ------->| Protected     |
     |   |  | e |<-(D)------ API response ---------| Resource[0]   |
     |   |->| b |                                  +---------------+
     |   |  |   |            Access Token          +---------------+
     |   |<-| S |--(E)----- in HTTP header ------->| Protected     |
     |   |  | e |<-(F)------ API response ---------| Resource[i]   |
     |   |  | r |                                  +---------------+
     |   |  | V |            Access Token          +---------------+
     |   |  | i |--(G)----- in HTTP header ------->| Protected     |
     |   |  | c |<-(H)------ API response ---------| Resource[N]   |
     |   |  | e |                                  +---------------+
     +---+  +---+
                             Figure 1.
In the above Figure 1, client uses a webservice which performs a single
authorization to obtain an opaque access token. It then uses the same acces=
s
token to request multiple protected resources without needing to re-authori=
ze
every time a new resource is used.
C,D: Request for license to decrypt the HD content
E,F: Multiple requests for the media fragments for HD content
G,H: Change request for lower bit-rate content in case there is network
congestion or need for lower resources on client. This request may happen a=
fter
30 mins of the start of the rich media experience session.

Thanks,
Gaurav Rastogi
Adobe Systems



--_000_CF4F27E3920D49C2A871EABA4B1A0F10adobecom_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html><head></head><body style=3D"word-wrap: break-word; -webkit-nbsp-mode:=
 space; -webkit-line-break: after-white-space; "><div><font class=3D"Apple-=
style-span" face=3D"Courier">This proposal is to allow use of same token to=
 access multiple</font></div><div><font class=3D"Apple-style-span" face=3D"=
Courier">protected resource across different servers. At minimum making it<=
br>optional would help in wide variety of media delivery use cases.&nbsp;&n=
bsp;<br><br>Proposal details:<br>Exclude hostname and port number in normal=
ized request string<br>creation. Another possible approach could be to allo=
w modifications<br>of the subdomains as consistent with the name server RFC=
.&nbsp;<br><br>Background: Adobe Media Streaming (HTTP and RTMP) use cases.=
<br>Current Adobe's IPTV and web video services partners including large<br=
>media broadcasting companies, CDN services, and IPTV solutions vendors<br>=
all face the problem that multiple resources need to be used for<br>making =
a single web video experience.&nbsp;&nbsp;<br><br>In case of HTTP media str=
eaming a single content delivery may comprise<br>of hundreds of individual =
http fragments served that are delivered<br>over multiple network connectio=
ns using multiple media assets. In<br>addition, Advertising, DRM and Licens=
e server API/interaction may also<br>be involved.<br><br>When dynamic strea=
ming or multi-bit rate media is being streamed then<br>fragments from diffe=
rent versions of the asset are requested based on<br>real time network and =
client feedback. Client re-authorization can<br>result in high a latency an=
d non-realtime system degrading the user<br>experience in wide variety of r=
ich media solutions delivered over the<br>internet.<br><br>In several load =
balancing solutions like CENAME or request redirection<br>may modify server=
 URI based on runtime considerations. Many CDN<br>workflows and global Inte=
rnet services use such schemes. Having<br>mandatory hostname, which could h=
ave been modified, restricts use of<br>HTTP token obtained before the load =
balancing decision was made.<br>&nbsp;&nbsp;&nbsp;<br></font><font class=3D=
"Apple-style-span" size=3D"3"><span class=3D"Apple-style-span" style=3D"fon=
t-size: 12px;"><font class=3D"Apple-style-span" face=3D"Courier">Example wo=
rkflow<br>&nbsp;&nbsp; &nbsp; +---+ &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbs=
p; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &n=
bsp;+---------------+<br>&nbsp;&nbsp; &nbsp; | C |--(A)------ credentials -=
--------&gt;| Authorization |<br>&nbsp;&nbsp; &nbsp; | &nbsp;l &nbsp;|&lt;-=
(B)------ Access Token ---------| Server &nbsp; &nbsp; &nbsp; &nbsp;|<br>&n=
bsp;&nbsp; &nbsp; | i | &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &n=
bsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+-------=
--------+<br>&nbsp;&nbsp; &nbsp; | e |<br>&nbsp;&nbsp; &nbsp; | n | &nbsp;+=
---+ &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Access Token &nbsp; &nbsp; &n=
bsp; &nbsp; &nbsp;+---------------+<br>&nbsp;&nbsp; &nbsp; | t | &nbsp;| W =
|--(C)----- in HTTP header -------&gt;| Protected &nbsp; &nbsp; |<br>&nbsp;=
&nbsp; &nbsp; | &nbsp; | &nbsp;| e |&lt;-(D)------ API response ---------| =
Resource[0] &nbsp; |<br>&nbsp;&nbsp; &nbsp; | &nbsp; |-&gt;| b | &nbsp; &nb=
sp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &=
nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+---------------+<br>&nbsp;&nbsp; &nbsp; |=
 &nbsp; | &nbsp;| &nbsp; | &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Access =
Token &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+---------------+<br>&nbsp;&nbsp; &=
nbsp; | &nbsp; |&lt;-| S |--(E)----- in HTTP header -------&gt;| Protected =
&nbsp; &nbsp; |<br>&nbsp;&nbsp; &nbsp; | &nbsp; | &nbsp;| e |&lt;-(F)------=
 API response ---------| Resource[i] &nbsp; |<br>&nbsp;&nbsp; &nbsp; | &nbs=
p; | &nbsp;| r | &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &n=
bsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+--------------=
-+<br>&nbsp;&nbsp; &nbsp; | &nbsp; | &nbsp;| V | &nbsp; &nbsp; &nbsp; &nbsp=
; &nbsp; &nbsp;Access Token &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+------------=
---+<br>&nbsp;&nbsp; &nbsp; | &nbsp; | &nbsp;| i |--(G)----- in HTTP header=
 -------&gt;| Protected &nbsp; &nbsp; |<br>&nbsp;&nbsp; &nbsp; | &nbsp; | &=
nbsp;| c |&lt;-(H)------ API response ---------| Resource[N] &nbsp; |<br>&n=
bsp;&nbsp; &nbsp; | &nbsp; | &nbsp;| e | &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;=
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbs=
p; &nbsp;+---------------+<br>&nbsp;&nbsp; &nbsp; +---+ &nbsp;+---+<br>&nbs=
p;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nb=
sp; &nbsp; &nbsp; &nbsp; Figure 1</font></span></font><font class=3D"Apple-=
style-span" face=3D"Courier">.<br>In the above Figure 1, client uses a webs=
ervice which performs a single<br>authorization to obtain an opaque access =
token. It then uses the same access<br>token to request multiple protected =
resources without needing to re-authorize<br>every time a new resource is u=
sed.<br>C,D: Request for license to decrypt the HD content&nbsp;<br>E,F: Mu=
ltiple requests for the media fragments for HD content<br>G,H: Change reque=
st for lower bit-rate content in case there is network<br>congestion or nee=
d for lower resources on client. This request may happen after<br>30 mins o=
f the start of the rich media experience session.<br><br></font></div><div>=
<font class=3D"Apple-style-span" face=3D"Courier">Thanks,</font></div><div>=
<font class=3D"Apple-style-span" face=3D"Courier">Gaurav Rastogi</font></di=
v><div><font class=3D"Apple-style-span" face=3D"Courier">Adobe Systems</fon=
t></div><div><br></div><div><br></div></body></html>=

--_000_CF4F27E3920D49C2A871EABA4B1A0F10adobecom_--

From eve@xmlgrrl.com  Fri Jan 29 13:07:30 2010
Return-Path: <eve@xmlgrrl.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id DCFFB3A68D3 for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 13:07:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.308
X-Spam-Level: **
X-Spam-Status: No, score=2.308 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FROM_DOMAIN_NOVOWEL=0.5, HELO_MISMATCH_COM=0.553, HOST_EQ_STATICB=1.372, HOST_MISMATCH_NET=0.311, J_CHICKENPOX_17=0.6, SARE_URI_CONS7=0.306, URI_NOVOWEL=0.5]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uD-v50HQChUJ for <oauth@core3.amsl.com>; Fri, 29 Jan 2010 13:07:29 -0800 (PST)
Received: from mail.promanage-inc.com (static-98-111-84-13.sttlwa.fios.verizon.net [98.111.84.13]) by core3.amsl.com (Postfix) with ESMTP id D6B433A659A for <oauth@ietf.org>; Fri, 29 Jan 2010 13:07:28 -0800 (PST)
Received: from [192.168.168.198] ([192.168.168.198]) (authenticated bits=0) by mail.promanage-inc.com (8.14.3/8.14.3) with ESMTP id o0TL7SXg012864 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 29 Jan 2010 13:07:51 -0800
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset=us-ascii
From: Eve Maler <eve@xmlgrrl.com>
In-Reply-To: <3D3C75174CB95F42AD6BCC56E5555B450220F59F@FIESEXC015.nsn-intra.net>
Date: Fri, 29 Jan 2010 13:07:28 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <EC663D5A-B46C-4911-A63D-65E0414548B9@xmlgrrl.com>
References: <1562D46F-058C-4EE6-956C-469719CA3E81@xmlgrrl.com> <3D3C75174CB95F42AD6BCC56E5555B450220F59F@FIESEXC015.nsn-intra.net>
To: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
X-Mailer: Apple Mail (2.1077)
Cc: OAuth WG <oauth@ietf.org>
Subject: Re: [OAUTH-WG] FYI, UMA webinar followup
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2010 21:07:31 -0000

Hi-- We had a bit of a glitch in the half-hour before the webinar, and =
sent out fresh notification emails.  It sounds like you didn't get =
yours, for which I'm very sorry!  We had about 20 people on.  There will =
be a recording (audio/video) available soon -- I'll alert this list at =
that time -- and the slides and wireframes are all linked from here:

http://kantarainitiative.org/confluence/display/uma/UMA+Explained

Specifically, we presented these materials in the order listed:

=
http://kantarainitiative.org/confluence/download/attachments/37751312/uma-=
webinar-2010-01-29.pdf
=
http://kantarainitiative.org/confluence/download/attachments/37751312/UMA_=
CV_wireframeV7.pdf
=
http://kantarainitiative.org/confluence/download/attachments/37751312/UMA-=
protocol-flow-deep-dive.pdf

	Eve

On 29 Jan 2010, at 11:24 AM, Tschofenig, Hannes (NSN - FI/Espoo) wrote:

> I registered for the seminar, got the bridge info, dialed in and =
nobody
> was there.=20
> Are there slides available?=20
>=20
>> -----Original Message-----
>> From: oauth-bounces@ietf.org [mailto:oauth-bounces@ietf.org]=20
>> On Behalf Of ext Eve Maler
>> Sent: 25 January, 2010 14:03
>> To: OAuth WG
>> Subject: [OAUTH-WG] FYI, UMA webinar followup
>>=20
>> I think I mentioned on last week's call that those of us=20
>> working on UMA are doing a status update in a webinar on=20
>> Thursday of this week.  You're invited to sign up (there's a=20
>> small handful of slots left).  Info and registration link are here:
>>=20
>> http://kantarainitiative.org/confluence/display/uma/Meetings+an
>> d+Minutes
>>=20
>> 	Eve
>>=20


Eve Maler
eve@xmlgrrl.com
http://www.xmlgrrl.com/blog

